When talking about encryption, there’s one statement that turns up again and again, “I’ve got nothing to hide.” This is a very limited view of things. It’s downright naïve. It’s a plain and simple fact – unprotected data can be exploited!
Cyber criminals often employ data that should not be accessible to them in the first place. Their data theft methods are myriad:
With little effort and a minimum of technical expertise, electronic data can be automatically extracted from texts or attachments. Not everyone knows that non-encrypted emails pass through the net like postcards in the mail. With just little technical expertise it is possible to access various Internet nodes and to read all the emails that pass through there.
Some people may think, “It is highly unlikely that one of my mails would be intercepted. What criminal would be interested in my data?” Well, think again! Data is collected and evaluated automatically en masse. Algorithms then filter the data according to specific catchwords or to data in attachments – all in a fraction of a second. Anyone thinking their data is not interesting can be the biggest prey for fraudulent prowlers, depending on their scam. Cyber criminals view your data from a distinctly nefarious perspective. Data is compiled and combined and can be used years later, when the opportunity for fraud or theft arises.
Extracting data on the way to the cloud
The path to the cloud is also subject to cyber-attacks, and, of course, the cloud itself is vulnerable when your data is stored there without encryption. Even though cloud providers employ high security measures, making attacks difficult, hacking into the cloud is still possible. A successful attack brings in a bumper crop of booty with masses of unencrypted data to snatch.
Naturally, data can come into the wrong hands when terminal devices are lost or stolen. Just about every laptop or smartphone contains data inviting fraud. This can be addresses, appointments or account information. When using public computers, we recommend using a flash drive, encrypting and storing your data on it.
Good to know: The greatest risk to your data occurs during transmission
Hackers have an easy time of it during data exchange. So, easily encrypt your data with Z1 CryptNow. Particularly when transferring sensitive attachments containing personal data. You can then send the encrypted data via email, over the cloud or through other sharing services.
Z1 CryptNow makes encryption extraordinarily simple. Most important, the addressee can decipher the data without special software. Once the password has been entered, Adobe PDF Reader shows you the decoded data that was encrypted with Z1 CryptNow. Files can then be opened and locally stored. If you, as the addressee, would like to subsequently re-encrypt the files, simply download Z1 CryptNow for free.