Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Cryptography Is Fun, But Your Business Calls for Encryption
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Cryptography Is Fun, But Your Business Calls for Encryption
Security

Cryptography Is Fun, But Your Business Calls for Encryption

timmaliyil
timmaliyil
5 Min Read
Image
SHARE

ImageWhile it’s pretty impressive that Nicolas Cage found a map on the back of the Declaration of Independence using only lemon juice and a hair dryer in “National Treasure,” our 21st-century techniques for encoding and decoding information are a little more sophisticated.

ImageWhile it’s pretty impressive that Nicolas Cage found a map on the back of the Declaration of Independence using only lemon juice and a hair dryer in “National Treasure,” our 21st-century techniques for encoding and decoding information are a little more sophisticated.

Today, we use encryption to secure sensitive data. It’s common to see encryption and cryptography used interchangeably, but it’s important to understand the difference between the two.

Cryptography vs. Encryption

More Read

Special Summary: Enterprise security stories
6 Essential Practices For Data Security With Remote Working
Law Firms: You Need Enterprise Level Cyber Security
Common Cyber Attacks And How To Protect Yourself From Them
Big Data Heightens The Race Between Proxies And VPNs

Cryptography is the science of secret communications. Encryption, which is a form of cryptography, provides a standard and methodology for encoding and decoding data in a reliable manner.

An easy form of cryptography to decode is pig Latin: Oday ouyay understandway ethay ordsway I’mway ayingsay? 

You can probably figure out the original message when hearing pig Latin. These types of hidden codes are fun in social situations and effective for internal company communication. For instance, it’s common in retail to hear codes blasted over the intercom to warn staff of possible shoplifters or for hospital personnel to use codes to communicate without alarming patients (e.g., “code blue” to indicate cardiac or respiratory arrest).

This type of cryptography wouldn’t work to encrypt your data, however. For cryptography to be effective, you need a complicated algorithm rather than a simple key. This is where encryption comes into play.

Unlike a password that you have to create and memorize, encryption algorithms are premade by some of the greatest mathematical minds in the world. The government set a FIPS 140-2 standard to help businesses dealing with sensitive data choose the encryption necessary for PCI and HIPAA HITECH compliance. This means there’s a slew of encryption algorithms available for you to encrypt your data. 

Why Businesses Need Encryption

The massive recent data breaches that affected Target’s and eBay’s customers underscore the importance of encryption for all businesses that handle personal information.

While it’s possible to simply encrypt user access and rely on basic cryptography for your data, your data is still at risk. Sony, for example, didn’t encrypt each cell in its database, so once the initial encryption was broken, intruders had access to all its customer data.

Modern data security laws require that a company notify its customer when customers’ information may have been breached. That’s not just limited to a successful theft event. Simply losing a laptop containing sensitive data is enough to legally qualify as a data breach.

Part of the data breach law requirement is that you put out a press release highlighting your mistakes. In this digital age where you can easily find information about anyone, do you think new customers will come to you when the first thing they find out about your business is information about a negligent data breach? 

Customer security and public perception aren’t the only reasons to encrypt your data, though. Malware, hackers, and viruses can make your systems unusable, which can disrupt your operations if they gain access.

Security Can Be Expensive

Security is a necessity, and you should be prepared to spend according to the sensitivity of your data. Some algorithms come with royalty expenses. Elliptic curve cryptography is a trusted algorithm used on some mobile phones, since it provides a high level of encryption in an efficient mathematical manner that doesn’t drain battery life. However, this algorithm comes at a price, and consumers pay this royalty fee when purchasing certain smartphone models.

There’s also the expense of deploying, managing, and training your staff on encryption products. The common person, and even many tech folks, may be intimidated by the terms and processes necessary to encrypt and decrypt data. If implemented correctly, however, few people within your organization should ever have to deal with encryption keys. 

While cryptography is a fun way to fool your friends, your business should rely on more than simple tricks and static keys to secure information. You should use the most sophisticated encryption you can afford to protect your data. Your customers will thank you.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

fda14abd c869 4da5 943c c036ad8efc2e
How Data-Driven Journalists Are Using API News Apps to Improve Reporting
Big Data Exclusive News
0622cae5 f7d7 4f74 84b5 eabd1a823dca
How Data-Driven Grocery Recommendations Help Shoppers Eat Better With Less Effort
Big Data Exclusive
business recovering from data loss
How Data-Driven Businesses Protect MySQL Databases from Shutdown
Big Data Exclusive
ai driven task management
Reducing “Work About Work” with AI Task Managers
Artificial Intelligence Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Debunking the Top Ten Myths of Cloud Based Disaster Recovery

17 Min Read
Image
Big DataCloud ComputingPredictive AnalyticsSecurity

Where the Fog Meets the Edge

4 Min Read
CASB
Security

CASBs Help Cloud-Based Businesses Avoid Data Breaches

6 Min Read

DARPA’s Cyber Fast Track Adds Agility to Research Funding

2 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?