Fighting hackers, however, is easy compared with the task of persuading consumers to use encryption technology.
The study also cautioned that there are proposals pending to restrict free flow of encryption technology.
But the security community knows that the boldest claims about new encryption technology demand the most scrutiny.
FORBES: Researchers Warn: Mega's New Encrypted Cloud Doesn't Keep Its Megasecurity Promises
Importantly, you may choose to put in place a centralized key management system to help easily manage your encryption technology.
Encryption technology is an important element of an information-centric security solution, as critical information is increasingly on mobile devices and in the cloud.
FORBES: Symantec Acquires Encryption Provider PGP For $300 Million
He establishes a connection to his account using a user ID and password known only to him, and the connection is secured using standard encryption technology.
In November the president of Germany's federal police complained that the encryption technology used by Skype makes it impossible for his officers to listen in on conversations.
One of the most important factors promoting the free flow of encryption technology was the Clinton Administration's loosening of export controls on mass market encryption software in January.
Heartland directly phoned 175, 000 customers, coordinated with government officials to facilitate full public disclosure at the earliest possible moment, and introduced new encryption technology to protect against similar breaches in the future.
FORBES: Into the Breach: Protecting the Brand When Data Loss Is the New Normal
Plus, the encryption technology can slow down performance.
FORBES: Facebook Responds to Firesheep WiFi Security Controversy
Outgoing Drug Enforcement Administrator Thomas Constantine, offering the most dire predictions, said lawmakers would create "an electronic sanctuary" for criminals intent on disrupting public safety or national security if the plan to drop controls on exports of encryption technology is not stopped.
It also controlled the encryption and access technology in its set-top boxes.
The new technique may serve as a wake-up call for mobile carriers, which have long been in denial about the vulnerabilities of GSM security, says Bruce Schneier, encryption guru and chief technology officer of BT Counterpane.
In 1997, for instance, the Senate debated technology that would require encryption-makers to build in a backdoor for law enforcement.
GuardianEdge, already a Symantec technology partner for Symantec Endpoint Encryption, provides strength in the government sector.
FORBES: Symantec Acquires Encryption Provider PGP For $300 Million
What about requiring every third-party service provider to protect personal customer data through encryption, tokenization or another advanced security technology, through clauses written into and enforced as part of standard service level agreements?
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
'' According to Schrader, information technology shops have long relied on encryption and firewalls to protect highly sensitive information.
Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.
Complex but publicly available encryption could also be used, but using this technology could draw attention - rendering regular message boards and groups a safer way of operating.
To encrypt its data, the pen uses an algorithm called Rijndael, which the National Institute for Standards and Technology is planning to use as the Advanced Encryption Standard, which will replace the existing Data Encryption Standard (DES), which is currently being phased out of use.
Secure storage devices with on-board encryption are available from many vendors today, including all hard disk manufacturers (Seagate Technology, Western Digital and Toshiba) as well as major SSD manufacturers such as Intel, Micron, and Samsung.
应用推荐