Have you been wondering what is encryption? To start with, let’s look at the bigger picture of communication data. Every day we are communicating with people or computers (such as Siri and Alexa), and a lot of that communication is also picked up by others – think of eavesdroppers, people nearby, or apps and IoT (Internet of Things) systems that just happen to be eavesdropping too.
If you’re at a dinner party and want to say something private to your friend, then you’d leave the dinner table and take her somewhere the other guests can’t hear what you talk about. When it comes to the IoT era however, that becomes a little more difficult!
Let’s face it, there’s always someone interested in intercepting our voice, text messages, emails, and phone calls. Whether it’s for ominous purposes, big data for marketing, or just a snoop – we need to be proactive to protect our communication data, and “leave the dinner table” in a digital way.
Different countries have long-since implemented different laws to prevent the interception of public communication channels, such as voice calls (PSTN), or Post, but when it comes to digital channels; there’s so many different ways to communicate that legislation takes a while to catch up.
The best way to ensure security of your communication data online? Encryption.
The first use of encryption for military purposes came when the Romans ruled the earth over two thousand years ago. Caesar needed a way to send communication documents to his troops in the field and thus developed a substitution cipher method. With this method, they simply shifted the letters in the alphabet by three. A straightforward method in today’s times, but very effective in its day. In modern times, decoding such straight-forward codes with a computer is super easy.
The first modern encryption standards were achieved by using algorithms that have a key to encrypt and decrypt information (Symmetric). In 1975, the first Data Encryption Standard (DES) was proposed in the U.S. Federal Register. In 2001, the more secure Advanced Encryption Standard (AES), which we use today, replaced DES following decades of advancements and innovations in CPU power.
With asymmetric encryption there are two types of keys: one for encryption (public key), and one for decryption (private key).
Transport Layer Security (TLS), known as SSL, is a cryptographic security protocol which is using symmetric and asymmetric encryptions to secure your communication. The TLS protocol aims primarily to provide privacy and data integrity. This protocol supports different type of methods for encrypting the data and authenticate for message integrity. We in CINNOX use the best methods approved by NIST to comply with compliances.
The CINNOX platform offers multiple ways for companies to communicate, both between their staff, and between staff with their customers. Our engineers and developers have had to look at all the different telecom and digital channels on offer in order to ensure communication across each of them is safe and protected:
Try not to use unsecured and public WiFi
When making a secure call, make sure the browser is using a Secure WebSocket
Always check permissions of applications and websites on your Microphone and Webcam
How to check spam phishing emails
History of Cryptography
Blown to Bits, Hal Abelson [ISBN 0-13-713559-9]
Great article on security
The use of SaaS applications has been gaining momentum with many businesses as an “on-demand” and “pay-as-you-go” solution. Low setup costs, easy implementation, and without the need to build or maintain any infrastructure, SaaS has empowered businesses to quickly address challenges and expand with low barriers to entry. With such a model, it’s easy to […]
A look at data retention. Every organisation collects data. Whether it’s the education, e-commerce, banking, or telecom industries, data is collected and stored for business and customer processes. The amount of data every organisation has collected increases by the minute. Each movement, transaction, sign-up, and so forth, is on the internet as a footprint. This […]
What is data protection and security? The recent acceleration of digital transformation for most organisations has been out of necessity, but bigger issues have been quickly arising around data protection and security. A lot of apps and remote office solutions were quickly picked up by organisations, governments, and the public, but dropped just as fast […]
No Credit Card required. 1-minute installation.