Why Encryption ?
|
Every organization and individual possesses certain vital information - a unique formula, specialized customer database, a personal diary, annual financial data, etc. The organization would be compromised if such data fell into the wrong hands.
|
|
Until a few years ago, protecting such information was relatively easy. All one required was a strong safe with a single key to access it. However, such privacy does not exist anymore. Encryption is now the only way to protect your valuables. Currently, except for a few strong encryption packages, there are no means available to perform this critical encryption function.
|
|
Passwords within most programs (Word, Excel, Access etc.) can be broken by mere novices without any computing knowledge. Such password breaking tools are easily available on the Worldwide Web, for as little as $5.95, or sometimes even for free!
|
|
Most companies invest millions of dollars in putting up firewall's and trying to secure their networks. Ironically, they spend the least amount of money in protecting the area where the data actually resides or is created, the PC's their employees use.
|
|
The costs involved in securing data at the user level are minimum.
|
|
Encryption renders your data, even if accessed by an unauthorized person, unintelligible and unusable. By adopting the simplest prevention techniques, you can ensure complete data privacy.
|
|
This is where Cypherix comes in. Our solutions address this basic security need - encrypting and protecting data where it is created and resides in its most vulnerable state - the PC.
|
|
Your most important assets are under attack constantly.
|
Over 70 per cent of the market capitalization of Fortune 500 companies is attributed to their information assets.
|
|
Yet, it is these very same assets that are most vulnerable today. Why? Because companies today have no choice but to connect their internal networks to the rest of the world to link up with customers, suppliers, partners, and their employees with one another.
|
|
There's almost no machine in the world that is not connected. With this connectivity comes total vulnerability. Malicious hackers, criminals, industrial spies; these attackers regularly steal corporate assets and intellectual property, cause service breaks and system failures, mar corporate brands, and destroy businesses. And this can happen to the data on your computer when you least expect it, when you're checking your email, and even when you're offline.
|
|
Safe from Hackers?
|
A ten year old sitting half way across the world could be stealing your data as you read this.
|
|
Hacking no longer requires experts. There are literally thousands of off-the-shelf programs available on the Internet that are as easy to use as the software packages you are so familiar with.
|
|
Anyone, even a child with limited or no computer know-how, can use these packages to hack into your systems. There is no defined, requisite learning curve - the amount of knowledge or background essential to be an effective 'hacker' is virtually zero.
|
|
Now, this 'hacker', probably knows your credit card number or even where you took your spouse for your anniversary dinner.
|
|
Safe while surfing?
|
Not by a long shot...
|
|
Did you know that even looking at a malicious web page exposes your computer to attacks? Hidden scripts on malicious web pages, that activate while surfing the Net, can pick up files from your hard drive and render them vulnerable by putting them at the hacker's mercy.
|
|
Safe when merely sending mail?
|
Not really, read on
|
|
Simple acts like going online to check your mail exposes your machine to being hacked. It is a trivial task to 'wiretap' somebody's email, so that all future correspondence is now in the hacker's inbox as well.
|
|
Safe offline?
|
Now for the really bad news...
|
|
If you thought you were safe because your PC is not connected to the Internet consider this: FBI and Computer Security Institute's Computer Crime Report 2000 reported that insiders were the biggest threat to corporate security.
|
|
Even the best of firewall and network security measures are useless, if your PC's aren't protected.
|