Encrypted Data: How safe is your sensitive Information?
Hacking is a persistent threat. It affects American businesses and government agencies alike. One standard defense mechanism against hacking is encryption. The thought process is: who cares if hackers get the data, they can’t use it anyways.
That assumption is true…for now. Hackers with the long-game in mind are collecting encrypted data now, with the belief that in 5? 10? 15? years quantum computers will be available that can breakthrough modern encryption.
Encryption algorithms are currently used to protect a variety of sensitive data, such as personal, trade, and state secrets. Aware of the future problem, US government officials are trying to develop new encryption algorithms that can successfully protect secrets even against quantum computers. This new regime is known as post-quantum cryptography.
Through the National Institute of Standards and Technology (NIST), the US has been holding a contest to produce an encryption algorithm that can withstand the processing power of quantum computers. The US is also putting a lot of money into quantum computing. So is China. Quantum computing is the sword and post-quantum cryptography is the shield. (Download our white paper on “Developing Privacy Governance with the NIST Privacy Framework.”)
The Department of Homeland Security recently revealed a road map for the transition to post-quantum cryptography. It starts with cataloging the most sensitive data. Malicious actors are constantly lurking in the background trying to get their hands on any valuable information. Clarip can help you identify your most sensitive and valuable information with our automated data-mapping and data risk intelligence scans. We also provide fully automated end-to-end data subject access request fulfillment and many other features to help your organization comply with data privacy laws. Visit us at www.clarip.com or call us at 1-888-252-5653 to learn more or schedule a demo!