7 Myths of Encryption

We get a lot of questions and concerns around encryption and how the implementation will affect the organization. Although people recognize the benefits of encryption, there are a lot of misconceptions around the notion of encryption and its impact within an organization.  It’s not to say that these misconceptions hadn’t been true once upon a time but with the evolution of technology, many of these “facts” have truly turned into something of the past. To dispel these myths, we have put together a handy guide on frequent encryption misconceptions and the reality behind them.

  1. Windows Login Passwords are adequate to protect your desktops and laptops.  In the event that the device becomes lost or stolen, a 3rd party can easily circumvent a device protected only with a Windows Login password and access all the private and confidential information stored within the device.
  2. Data encryption slows down performance and hinders productivity.  Many encryption operations can now perform more efficiently on the processing hardware (with technology such as AES-NI) making performance less of an issue; thereby, running seamlessly in the background without the user even realizing it.
  3. It is a headache for IT to deploy data encryption solutions.  A single management console is imperative.  This allows IT to easily deploy, manage and support devices no matter what the enterprise’s encryption strategy is.  Transparency and control can be granted to the IT department so that there are no surprises.
  4. Encryption solutions for the enterprise are way too expensive. Too often, organizations do not factor in the cost of lost or stolen data.  Add the risk of hefty fines and negative public attention and suddenly an encryption solution to ensure the safety of your private data doesn’t seem so bad anymore.
  5. OS-based encryption solutions are enough to protect the enterprise. Many of the free OS-based encryption solutions simply do not offer the features and functionalities organizations need to fully secure their data. In addition, many of these solutions support only a few device types, making it hard for the organization to use the same solution across the company, where employees may have different devices.
  6. There is no compelling reason for data encryption. With many recent public data breaches reported around the globe, it is clear that hackers and thieves are getting smarter and more sophisticated and lax data security continues to be a problem.  Given the importance of your corporate data and the need to maintain a positive brand image, isn’t it time your security policies got smarter too?
  7. It is not practical to encrypt and manage mobile devices within an organization. Given many organizations are going down the path of Bring your own device (BYOD), it makes sense to encrypt mobile devices as they quite often contain private financial and organizational data that could trigger serious consequences if leaked.  With a capable enterprise wide encryption solution, a single management console along with a flexible solution that works on all types of devices will help mitigate these risks.

Download the full version of our whitepaper – Data Encryption Demystified today to learn more!  Or get in touch with our product specialists at sales@winmagic.com.

Previous Post
Waging the War on Passwords
Next Post
Hot Topics from the RSA 2013 Security Conference

Related Posts

Connect with us again!

WinMagic will be attending a number of different events over the next few months including our next Data Connectors event. Come and visit us at Data Connectors in Louisville, Kentucky on March 19th, 2014! (more…)
Read more

Apple’s Privacy Policy

Apple’s new privacy policy allows the user to encrypt emails, contacts, and photos that uses a code that the user has created. Not even Apple will have access to this code. This gives sole power over iPhone’s personal data to…

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by…

Leave a Reply

Your email address will not be published.

Fill out this field
Fill out this field
Please enter a valid email address.

Contact Us

This will close in 15 seconds