It seems all business leaders would understand by now, after literally thousands of privacy incidents in recent years, that they need to encrypt personally identifiable information (PII) stored on mobile computers and mobile storage devices, and when sending PII through networks.
Even the bad guys understand this.
Computerworld reported that terrorists are now using a pretty fine encryption method that is extremely easy to use and has a great user interface.
One vulnerability to their encryption solution, however, is that it is easier to spot files and data that are encrypted using this method.
If terrorists can use encryption successfully, why can’t more businesses?
Tags: awareness and training, encryption, Information Security, IT compliance, personally identifiable information, PII, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, surveillance, terrorist