Go To Content Go To Menu

MTG News

The latest and interesting news from and about MTG

Sep 2, 2013

There are differences in encryption technologies

The more time and money hackers need to break or circumvent the encryption, the less data can be intercepted. The safest key is useless, however, if it can be easily stolen or copied.

As you know, there is no such thing as one hundred percent security. It is always a question of time, money and method in order for someone to intercept sensitive data. The recent allegations regarding the monitoring methods of the NSA have clearly brought this issue to light.

Encryption technologies remain one of the most important means at a company's disposal to make it as difficult and expensive as possible for someone to potentially obtain possession of their important data. There is also a difference in the encryption algorithms used (e.g. elliptic curves, RSA) and the quality of the certificates. Generally, you should always use the strongest cryptography (e.g. the longest key) in lieu of obsolete encryption technology.

With these precautions in place, usually only the unencrypted data remains of particular interest for hackers. Unfortunately, there are still too many messages without this security. We recommend companies to exercise caution by encrypting all data.

As proof of the authenticity of the user key or password, we recommend the implementation of digital certificates from a Public Key Infrastructure (PKI). Certificates can be obtained, for example, by a Trust Center. For larger companies, which manage a large number of certificates, control of their own PKI operation may be worthwhile. We recommend private users to inquire through their Internet provider about appropriately secured services and encryption options. The more you protect yourself the harder and more expensive it is for hackers to keep an eye on you.

IT security means taking a holistic approach. Considering potential attack scenarios as well as a certain amount of paranoia, are important components of success. If, for example, your computer is unprotected, even the safest private keys can be stolen or copied. The best safety lock on the front door is useless if you hide the key under the doormat.


L├Ądt …