Covering the latest industry trends and an excellent source of thought leadership.
Online Tech’s Senior Product Architect Steve Aiello leads a data security series of videos on data encryption by explaining what it is and the history of the process. Watch the full video on our site.
Data encryption has been around since the Ceasar Cipher, an algorithm used in the Roman times. Encryption is scrambling data that is unreadable to people that do not have the key. Aiello describes how a key is the map to the encrypted data (cipher text) that is decrypted into plain text. It is used to keep unauthorized people from viewing sensitive data.
Learn more about encryption of data at rest and in transit on our Defense in Depth page.
The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using encryption in the cloud.
Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a full arsenal of security services for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.
Download our latest white paper, Encryption of Cloud Data.
CEOs Discuss Encryption for Healthcare
Last week marked an important deadline for physicians, HIPAA covered entities (CEs), business associates (BAs), and subcontractors to comply with HIPAA’s privacy and security requirements. Now any healthcare organization that supports the processing, facilitation, or collection of PHI (protected health … Continue reading →
Defense in Depth Strategy: Cloud Encryption is Just One Tool
Defense in depth – what does it mean? NSA.gov, the U.S. National Security Agency, refers to the term as a “practical strategy for achieving Information Assurance in today’s highly networked environments,” citing Information Assurance to include the protection of information … Continue reading →
HIPAA Encryption in the Cloud: Don’t Sacrifice Performance for Security
Earlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of HIPAA encryption: “…regardless of size, covered entities must take action and will be held accountable for safeguarding their patients’ health information. Encryption is an … Continue reading →
Otava provides the secure, compliant hybrid cloud solutions demanded by service providers, channel partners and enterprise clients in compliance-sensitive industries. By actively aggregating best-of-breed cloud companies and investing in people, tools, and processes, Otava’s global footprint continues to expand. The company provides its customers in highly regulated disciplines with a clear path to transformation through its effective solutions and broad portfolio of hybrid cloud, data protection, disaster recovery, security and colocation services, all championed by an exceptional support team. Learn more at www.otava.com.