Encryption: What it is and Where it’s Going.

In order to demonstrate private and public key encryption, it is best to have a cast of characters. Meet Alice, Eve, and Bob.     Alice wants to send Bob some sensitive information. Eve has been trying to get this information from Alice. She has been watching her communications in anticipation. How can Alice send this information to Bob without Eve seeing the information? Let’s assume that Alice and Bob are not able to meet in-person, so physically handing off the information is not an option. Symmetrical Key Encryption If this were a physical box containing sensitive information, then Alice …

Mobile Device Security

More and more small businesses are offering mobile devices to their employees as a means of increasing productivity and improving efficiency. It should not surprise you that these devices, and those belonging to the employees, pose a potential security risk to the network infrastructure. One survey found that 45% of businesses do not have a policy or plan to provide IT support for these devices. Businesses need to acknowledge the threat that mobile devices pose and take preemptive action to avoid the costly downtime, diverted resources, loss of data, and damage to the company’s public image that a malware attack …

Online Privacy and Cookies

Have you ever been on Google looking for something and then it shows up in your Facebook feed? Have you noticed that advertisements on the internet seem more and more applicable to your wants and needs? Well, you can thank (or scorn) big data for that. The practice is commonly known as “targeted advertising” uses data to target the most receptive candidates. Advertisers know that someone browsing for socks might very well purchase socks from an online retailer that gets in front of them. This sort of data can come from a variety of sources. One of the most common …

Introduction to Encryption

If your passwords are not encrypted, then you are leaving your data open to hackers. Encryption, simply put, converts readable strings of text into a secret code. Simple encryption might be “banana” as “21141141” where 1 = A, 2 = B, and 14 = N. Obviously encryption codes are well beyond this numeric system, but the concept is the same. When passwords are encrypted they are passed through a code that stores them in this illegible format and then returns them back to a readable format when being accessed for credentials. Computers are far better at quickly identifying patterns and …