25.08.2015 Views

GSN Aug/Sept Digital Edition

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

dialogues that spur policy developmentsand economic growth.”Indian leaders are especially interestedin working with the UnitedStates because the world’s secondmost populous country has unveiledits ambitious “<strong>Digital</strong> India”initiative. By 2019, India wants tomake government services availableelectronically to the entire countryand involves plans to bolster Internetconnectivity in rural areasthrough the establishment of highspeednetworks.“The government’s programs topromote cybersecurity and assurenational security are closely tiedto the systems and infrastructurewhich business operates,” said JoeAlhadeff, Chair of the USIBC’s <strong>Digital</strong>Economy Committee. “Consultationwith business as early in theprocess as possible can help assurethat such programs are implementedeffectively while avoiding needlessburdens or unintended consequencesto innovation and businessoperations. Such collaborationis essential to fulfilling the PrimeMinister’s ambitious programs forIndia’s continued economic growthand societal inclusion.”The two countries agreed to continuediscussions, with the nextround taking place next year inDelhi.Protecting data in motion:A look at data encryptionBy Shawn CampbellAs “Big Data” and cloudcomputing grows inpopularity, so has electronicinformation theft.Information theft nowaccounts for 27% of allreported fraud.For most of the information securityindustry, protection usuallymeans trying to prevent a breachof your IT system. Today, however,it’s not so much if an IT system willbe breached, but when. It’s moreimportant than ever to keep unprotecteddata out of unauthorizedhands. That, in turn, means focusingon data encryption.As soon as your data is set in motion,you’ve lost control, and thatputs your data at risk. When informationis stolen, it may take years tofully understand the damage to yourorganization – and in that time,more damage can occur repeatedly.Encryption of data will not keepcyber-criminals from hacking intoyour data network, but it does protectthe data, making it useless to thehackers. Let’s look at why data encryptionis so vital to your network,and the best approach to encrypting33your organization’s information.Organizations spendthousands upon thousandsof dollars on traditionaldata network securitymeasures such asfirewalls and anti-virussoftware. Unfortunately,there are many surprisingly easyways for hackers to get their handson data as it travels among data networks.With the increased amount ofdata being moved between locations,the use of fiber networks isincreasing dramatically. With fiberoptic networks, coupler splicing andcountless other ways provide meansfor eavesdropping on networks toalter, download, and compromiseunencrypted data in motion. It’snot enough, then to protect the network.You have to protect the dataitself.Many organizations mistakenlybelieve encrypting data in motionwill lead to huge losses of bandwidth,network performance andincreased costs.That’s not necessarily true.Data in motion can be protectedMore on page 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!