The key to success.


Fate strikes one day …… .Your database has been hacked!
Now your customers' confidential data are on the street including your own company data along with dubious pictures of the last Christmas party.

You must file a report with the Dutch Data Protection Authority. A high fine is waiting.

A thousand questions come to mind. The most important? Could you have prevented this nightmare? The answer to that question is simple. Yes, that could have been done differently, for example by encrypting the data. In that case, a hacker finds the same mountain of data that he cannot use at all. Good to know right?

Unfortunately, encryption is certainly not the standard and often not popular with many organizations. Setting up encryption is not the easiest task. However, you also want to close your front door before you leave home, don't you? As a company, you often only switch to data encryption when it is set up “automatically”, such as with the TLS (Transport Layer Security) protocol within HTTPS-connections in the various internet browser environments.

What solutions for data encryption are there?

Record encryption for databases;

A combination of symmetrical and asymmetrical cryptography at (individual) record level.

A combination of symmetrical and asymmetrical cryptography at (individual) record level. The database contains sensitive data. With https that secure can be transferred but if a hacker succeeds in getting to the database then he can also read and take all data at once. For this reason, all data in the database is encrypted. A hacker may be able to access the encrypted data, but it is no use to him. Additional challenge: Who holds the key in possesion?

A hacker may be able to access the encrypted data, but it is no use to him. Additional challenge: Who manages the key? If the database key is sent to users, the hacker could also get it. Therefore, a different type of encryption is used to send the key. The receiver is the only one who can use the database key. He therefore logically has access to the database.

Bulk encryption of data:

Extremely suitable for applying to data that will not be used for a long (er) time; Use is made of automatic bulk encryption. This is done with the symmetrical algorithm GnuPG, a PGP variant.

Once sensitive data has been processed, it is no longer always necessary to have direct access to it. It is of course possible to make this data available again. Stored data can be encrypted with an asymmetric algorithm. Encryption is automatic and without entering a key. Retrieval is still possible, but a key must be entered for this. 

Encryption is automatic and without entering a key. Retrieval is still possible, but a key must be entered for this.

As a result, large amounts of data have become unusable for a possible hacker.

We are happy to help you with your questions, advice and implementation of data encryption within your company! we are happy to give you the key!

Data encryption by newITera, don't let anyone look into your cards.

Get the lock installed on your door today.

Click here: