Entries in security (3)
According to the Privacy Rights Clearinghouse, more than 19 million records have been involved in a data breach so far this year. Protection of data requires multiple layers of defense, and the use of encryption to secure sensitive data is a critical tool in this multi-layered approach.
Encryption scrambles a message or file so only the sender and the authorized individual with the decryption key can decode it. Encryption solutions generally encompass two types: hardware and software. Examples of hardware encryption include a pre-encrypted USB device or hard drive; software encryption consists of a program installed on a machine that encrypts some or all of the data on the system.
Free Webcast: Registration Now Available: April 18th National Webcast on Cyber Security Emerging Trends and Threats
Cyber Security Emerging Trends and Threats: Risk in a Cyber World
Wednesday, April 18, 2012
2:00pm -- 3:00pm (Eastern)
Here is a great article that speaks about data theft from Social Networks (LinkedIn, Google +,Twitter, Smartphones & Facebook) for the first time. It's a great read for anyone who is concerned about privacy online.