At present, the network security environment is deteriorating day by day. How to ensure the data security of key information and prevent information leakage caused by attacks is becoming the focus of many government and enterprise departments. The author believes that among various security protection technical means, encryption technology is not only an indispensable key means of protection, but also the last line of defense to prevent enterprise data from "running naked"!
Encryption makes enterprise data no longer "naked" Although the number of companies using encryption technology has been increasing over the past 10 years, it is important to note that 39% of companies still store data in plain text. As revealed last week by an e-commerce platform, tens of millions of accounts were leaked. Except for passwords that were encrypted with MD5, other data such as user names, real names, email addresses, QQ numbers, phone numbers, ID cards, etc. were all stored in plain text. In this case, once the company's data is "hit by a database", attackers can easily obtain a large amount of relevant information about users and go to other websites to hit the database. On the contrary, if the enterprise encrypts all data involving user privacy, even if the attacker obtains it, it will take a lot of time and energy to crack it twice to obtain the data. It can also effectively reduce subsequent related attacks, which will invisibly build a new security line for the enterprise's data protection. According to the survey, both individuals and enterprises are gradually becoming aware of this and are beginning to use encryption technology to improve the security of data information. Therefore, the strength of encryption performance has become a very concerned issue. For enterprises, when it comes to encryption technology, the first thing they pay attention to is its encryption performance, and the second is whether it can support internal deployment or cloud deployment. Statistics show that in 2005, only 16% of enterprises widely used encryption technology. After 10 years of development, this proportion gradually increased to 34% last year, and jumped to 41% in 2016. So which industries are most concerned about encryption technology? The first is the financial industry, with 56% of financial companies widely using encryption technology. The second is the medical and pharmaceutical industry, while the manufacturing industry is far behind, with only 25% of companies using encryption technology. When it comes to specific applications, databases have the highest proportion of using encryption technology, followed by Internet communications, laptop hard drives and backup systems. At present, encryption technology has spawned many encryption tools, so companies do not need to purchase them separately. In addition, competition and technological progress have also reduced the price of independent encryption products. With the continuous evolution of encryption algorithms and the diversification of encryption methods, almost all large databases use encryption technology. In terms of Internet data transmission, the rise of quantum communication and the rapid popularization of applications based on the network security protocol SSL (Secure Sockets Layer) have strengthened the confidentiality of data transmission. Therefore, it can be predicted that in the next three to five years, 70% of companies will pay more attention to encryption technology and apply it to security protection to ensure that corporate data is no longer "naked"! |
<<: 4 major roles of the network in enterprise digital transformation
>>: Is the future of the new WIFI standard 802.11ad reliable?
[[388868]] There is a seemingly endless list of 5...
I believe everyone knows that my country's Hu...
On November 16, the 19th China Hi-Tech Fair (CHTF...
The systemd module in Ansible is a good helper to...
Currently, most new data centers are operating at...
[[409633]] This article is reprinted from the WeC...
In recent years, under the guidance of the "...
The information about RackNerd providing AMD Ryze...
Wireless charging is very popular recently, and m...
In the development history of China's ICT mar...
[51CTO.com original article] It has been a week s...
6G networks are defined as cellular networks that...
ExtraVM is offering a promotion for VPS hosts in ...
1. About safety 1. Connected cars are more than j...
The transformative power of 5G is at the forefron...