In recent days, a wave of indignation was triggered when the Washington Post published information suggesting that U.S. authorities such as the NSA have access to data from large Internet service providers and cloud services under the program called "PRISM".
Even if the affected companies deny that such access to data has occurred doubts remain. Ultimately nobody knows whether his data is copied or read and how the information will be used. Ideally, of course "only" to ward off crimes as terrorist acts. But how far may the analysis of the data go to identify potentially criminal activities in advance?
Another spin on this is the stance of the Chinese Government who appear to sponsor the theft of data wherever it may be found to advance their trade position and improve their competitive position in the world. There is a deep conflict of philosophy here but for an organisation with private data the challenge is the same.
“This story highlights a real dilemma for business today” states Matthias Kess, Technical Director of email encryption and secure file transfer solutions vendor Cryptshare, he goes on “Whilst there is considerable appeal to some aspects of shared services and the benefits of scale that Cloud vendors offer these are offset for many by the rational desire to keep their data in a place which they know is as secure as it can be and we are not short of threats to our secrets! There is a real tension here between the need to protect information from the myriad of threats to it, and remember there are penalties if we fail to meet the data protection laws in place in our country and the desire for the state to scrutinise data and protect us from threats of one kind or another.”
This debate is causing many to look again at the need to protect core information in files, data stores and when in transit and many are looking to Cryptshare as a key part of a more secure infrastructure for their staff.
With your own installation of Cryptshare your information is protected against external interference of any kind, although it requires you to take some small steps to get started. Your Cryptshare system can be running in your own IT infrastructure or can be hosted, access is limited in a range of ways which you can control from general access to your systems and using the security systems of your IT infrastructure. Critically the files residing on your Cryptshare server can only be accessed by persons who are in possession of the correct transfer ID and the associated password, the sender and recipient. No other access is possible, either when in transit or stored.
“We designed our system from the outset to be highly secure but easy to implement” says Kess, “Surely the correct way for Governments to protect us is to encourage organisations of all kinds to protect the information they have to in the strongest ways, it is then up to the companies themselves to ensure proper use policies are adhered to.”