Encryption: An Essential Yet Highly Controversial Component of Digital Security
- by Brittany Day
If you’ve been keeping up with recent security news, you are most likely aware of the heated worldwide debate about encryption that is currently underway. Strong encryption is imperative to securing sensitive data and protecting individuals’ privacy online, yet governments around the world refuse to recognize this, and are continually aiming to break encryption in an effort to increase the power of their law enforcement agencies.
Governments have been trying for years to require that companies build backdoors, or deliberate weaknesses in encryption intended to provide easy access to encrypted data, into encrypted software and technology, arguing that unbroken encryption makes criminal investigations too difficult. The FBI has been using the term “going dark” since the late 90’s to describe the “threat” that strong encryption poses to omnipresent government surveillance.
This fear of strong, unbroken encryption is not only unfounded - it is dangerous. Encryption with built-in backdoors which provide special access for select groups not only has the potential to be abused by law enforcement and government agencies by allowing them to eavesdrop on potentially any digital conversation, it could also be easily exploited by threat actors and criminals.
US Attorney General William Barr and US senators are currently pushing for legislation that would force technology companies to build backdoors into their products, but technology companies are fighting back full force. Apple and Facebook have spoken out against the introduction of encryption backdoors, warning that it would introduce massive security and privacy threats and would serve as an incentive for users to choose devices from overseas. Apple’s user privacy manager Erik Neuenschwander states, “We’ve been unable to identify any way to create a backdoor that would work only for the good guys.” Facebook has taken a more defiant stance on the issue, adamantly saying that it would not provide access to encrypted messages in Facebook and WhatsApp.
Senator Lindsey Graham has responded to this resistance authoritatively, advising the technology giants to “get on with it”, and stating that the Senate will ultimately “impose its will” on privacy advocates and technologists. However, Graham’s statement appears unrealistic, and several lawmakers have indicated that Congress won’t make much progress on this front in 2020.
This article will examine the pivotal role that strong encryption plays in digital privacy and security, and hopefully dispel some of the common and detrimental myths that exist surrounding encryption.
What is Encryption and Why Is It So Important?
Encryption is the process of encoding information in a manner in which only authorized parties can access it and unauthorized parties cannot. Encryption does not prevent interference, but rather denies intelligible content to anyone who does not have access to a specific encryption key.
The right encryption is highly effective in preventing data theft, and has a long history of being used by governments and militaries to facilitate secret communication. Encryption is now commonly used to protect sensitive or confidential information for all types of uses and users. It is essential in protecting data in transit in cases such as email communications, information transferred via networks and mobile phone conversations.
The Advanced Encryption Standard (AES) is the standard algorithm that is used in virtually all cryptography today. AES was established by the United States National Institute of Standards and Technology (NIST) and is the only publicly accessible cipher approved by the National Security Agency (NSA) for government use.
Encryption: Vital to Effective Email Security
Encryption is an essential part of any email strategy or solution. It protects sensitive information shared via email such as financials, customer records and intellectual property, while preventing data loss. All effective cloud email security solutions utilize strong encryption as a means of providing complete, end-to-end email email protection.
When it comes to encrypting email, there are various protocols that email security providers often incorporate into their solutions. They include:
- Transport Layer Security (TLS): TLS is a cryptographic protocol designed to secure communications over a computer network. The protocol aims to provide privacy and data integrity by encrypting email traffic from server to server.
- Domain-based Message Authentication, Reporting & Conformance (DMARC): DMARC is an email authentication protocol that gives email domain owners the ability to protect their domain from unauthorized users. Once a DMARC Domain Name System (DNS) is published, receiving email servers can authenticate incoming emails based on the instructions published by the domain owner within their DNS entry. DMARC helps protect a domain from threats such as phishing and business email compromise (BEC).
- Sender Policy Framework (SPF): SPF is a method of email authentication which detects the forging of sender addresses during the delivery of an email message. This protocol allows a receiving mail server to confirm that mail claiming to come from a specific domain is submitted by an IP address authorized by the administrators of that domain. Only in combination with DMARC is SPF capable of identifying email spoofing, or the creation of email messages with a forged sender address which is often used in phishing and email spam.
- DomainKeys Identified Mail (DKIM): DKIM is an email authentication method designed to detect email spoofing. By attaching a digital signature linked to a domain name to each outgoing email message, it allows either technology or end users to confirm that an email claimed to have come from a certain domain was indeed authorized by the owner of that domain.
When choosing an cloud email security solution, look for one that utilizes most, or preferably all, of these encryption protocols. As with any aspect of security, defense in depth is key to effective protection, and encryption is no exception. Multiple methods of email authentication working in concert will be highly beneficial in terms of protecting your privacy and the integrity of your data.
Guardian Digital EnGarde Business cloud email security is an ideal solution for organizations looking to secure their email accounts with multiple layers of encryption and email authentication protocols. EnGarde provides comprehensive end-to-end business email protection using TLS, DMARC, SPF and DKIM to protect sensitive data and authenticate every email that is delivered, mitigating the risks associated with malicious emails reaching the inbox.
Encryption and Network Security
In addition to the vital role that it plays in email security, encryption is also a critical aspect of network security. Network encryption, or the process of encrypting messages transmitted over a computer network, is essential in protecting the privacy and integrity of data in transit between networks. It ensures that data is unreadable when it is transferred between network nodes, preventing eavesdropping of network traffic by unauthorized users.
The SSL standard is the default form of network data protection for Internet communications; however, many companies also choose to secure their internal networks, virtual private networks (VPNs) and corporate backbone networks with network level encryption to help protect against cyber attacks and data breaches.
On IP-based networks, Internet Protocol Security (IPSec) is an open standard which provides encryption at the network level, acting as a framework that can authenticate connections and confirm the integrity of data. IPSec can be used to securely transfer data from network-to-network, host-to-host or network-to-host. With IPSec, individual messages may also be encrypted at the application level with tools such as GNU Privacy Guard and OpenSSH.
Ransomware: The Dark Side of Encryption
While encryption has had a largely positive impact on cybersecurity, like any powerful tool, threat actors have developed ways to incorporate it into their exploits. The primary example of this “dark side” of encryption is ransomware, a type of malware designed to encrypt a victim’s files until they have paid the sum of money that the attack demands. While ransomware decryption tools exist for many common ransomware variants, these tools are typically not available for newer or less common strains of ransomware.
Ransomware attacks are on the rise and can have severe consequences for organizations. Over the past year, ransomware attacks from phishing emails have increased by an alarming 109 percent, putting 60% of small companies victimized out of business with six months of getting hit with an attack. Implementing an advanced, comprehensive business cloud email security solution that identifies and combats sophisticated threats like ransomware in real time is the most effective way for organizations to mitigate their risk.
The Bottom Line
Encryption is an essential component of digital security that should be embraced, not feared. In any scenario, unencrypted data is subject to prying eyes. Strong, unbroken encryption is vital in protecting privacy and securing data both in transit and in storage, and backdoors would leave sensitive data vulnerable to tampering and theft. Encryption prevents governments from spying on companies and citizens, a task that is more critical than ever after the implementation of the PRISM surveillance program, in which the National Security Agency (NSA) indiscriminantly monitors communications en masse, supposedly in an effort to combat terrorism. The argument for incorporating backdoors into encrypted communications is unfounded and fundamentally flawed, and is ultimately a disguise for government surveillance and the abuse of power.
What are your thoughts on the current debate surrounding encryption? Leave a comment below and let us know - we are passionate about this topic and would love to have a discussion!
- Thinking Strategically about Email Security in 2021 and Beyond
- There’s a Lot to be Gained with Effective Email Security
- Behind the Shield: EnGarde Cloud Email Security Explained
- Open Source: A Powerful, Yet Underutilized Weapon against Phishing & Zero-Day Attacks
- Buyer's Guide: What to Prioritize in an Email Security Solution
- Buyer's Guide to Office 365 & Workspace Email Security
- EnGarde Cloud Email Security: The Logical Solution to Cyber Risk in Office 365
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Top Email Security Risks in 2021 - How To Set Your Business Up for Safety & Success
- Ransomware By The Numbers: How Big Is My Risk?
- SMB Ransomware Warnings & How To Prevent an Attack
- Apache SpamAssassin 3.4.6 Release Fixes Two Potentially Aggravating Bugs
- Top Tips and Advice for Staying Safe Online in a Work-from-Home World
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Why Your Business Needs Better Email Security
- Why Ransomware is a Threat to Business
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Effectively Securing Business Email Accounts: Are Employees the Weakest Link?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: A Passionate Engineer Brings the Power of Open Source to Business Email Security
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- The Remote Worker's Guide to Safely Navigating Office 365
- Why Your Business Needs Better Email Security
- Defending Against COVID Email Spoofing Attacks with DMARC
- You’ve Got Mail: How To Tell If It’s Fraud
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Top Email Security Trends Putting Your Business at Risk of Attack
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2020
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How to maintain security when employees work remotely: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Office 365 Email Is Vulnerable to Attack Without These Critical Supplementary Defenses in Place
- Keep the Holidays Merry & Bright - Beware of These Sneaky Seasonal Phishing Scams
- Migrating Business Email: The Hidden Complexities You Need To Know
- How Do SPF, DMARC & DKIM Secure Email Against Sender Fraud?
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Ransomware Attack Explained - Best Practices For Ransomware Protection
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Complete Guide on Email Security & Threats Faced by Organizations
- Email Virus - Complete Guide to Email Viruses Plus Best Practices
- What Are Zero-Day Attacks & How Can I Prevent Them?
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail