Close this search box.

Data Encryption in Business, How Does It Work?

Data encryption in business is on the rise in the digital world due to the growing concern about assets in digital transformation projects.

These assets are distributed in the most diverse electronic environments, from local machines, servers, databases to mobile devices. Hence the big challenge: how to protect?

According to the ITU (International Telecommunication Union), in 2017 more than 3.6 billion people used the internet worldwide.

These people consume and generate information, so you can get an idea of the amount of data being trafficked.

Figure 1: Internet users in millions. Source: ITU.

Until recently, the term cryptography was unknown to most people until popular applications spread the concept.

Data encryption in business is gaining ground in the day-to-day conversations of IT professionals, from infrastructure and development to data storage.

However, due care must be taken to ensure that its benefits do not become a problem for companies.

It is known that once encrypted, the data will only be available to those who possess the secret key to decipher it.

But some doubts usually arise in this type of project, such as which data to encrypt? Will there be a loss of performance? How do I manage the keys?

Data encryption in business, should I use it?

According to the breachlevelindex website , in 2016 alone approximately 1.4 billion pieces of data were leaked. Only 4.2% of this data was encrypted, meaning that 95.8% of the data was available without any protection.

So you need to be one step ahead in the event of a security breach. This means putting additional protections into the organization’s strategy, such as encryption in the event of a data leak.

Modern HSM

What to encrypt?

In principle, any data can be encrypted, but it is important to define which data is sensitive for the organization. The best known are databases, file systems and virtual machines.

However, what hardly converges is the cryptographic key management model that will be used in the data protection and recovery processes.

What we’re trying to address here is: what if the key is lost?

Or what happens if the key is accessed by unauthorized users?

If these premises are not taken into account, the use of cryptographic systems, rather than a solution, becomes a major problem for an organization.

Thus, a solid solution for data encryption in business must include the adoption of a key management module that includes access control and backups.

There are several libraries that help developers with this task, as well as equipment such as HSM and Gemalto‘s KeySecure solution.

Finally, we conclude that using cryptography is a path of no return. However, projects must not overlook fundamental premises such as performance, management and secure key storage.

About Eval

A Eval está há mais de 18 anos desenvolvendo projetos nos segmentos financeiro, saúde, educação e indústria. Desde 2004, oferecemos soluções de Autenticação, Assinatura Eletrônica e Digital e Proteção de Dados. Atualmente, estamos presentes nos principais bancos brasileiros, instituições de saúde, escolas e universidades, além de diferentes indústrias.  

Com valor reconhecido pelo mercado, as soluções e serviços da Eval atendem aos mais altos padrões regulatórios das organizações públicas e privadas, tais como o SBIS, ITI, PCI DSS, e a LGPD. Na prática, promovemos a segurança da informação e o compliance, o aumento da eficiência operacional das empresas, além da redução de custos.  

Inove agora, lidere sempre: conheça as soluções e serviços da Eval e leve sua empresa para o próximo nível.  

Eval, segurança é valor. 

About the author

Other posts