Home Data-Driven Thinking Data Security And Encryption: A Path Less Traveled

Data Security And Encryption: A Path Less Traveled

SHARE:

stevecox-updatedData-Driven Thinking” is written by members of the media community and contains fresh ideas on the digital revolution in media.

Today’s column is written by Steve Cox, chief operating officer at Technology Services Group.

With the proliferation of mobile devices and remote access, the boundaries between a company’s data and the outside world have increasingly blurred. What’s of more concern is that potential entry or access points have multiplied exponentially.

So when companies ask me where they should start with IT security, I have a simple answer: encryption. Rather than protecting the perimeter, which is almost impossible to define, it now makes more sense to safeguard a marketer’s crown jewels, which, in many cases, is data.

If you were to analyze news stories about corporate or government hackings, you’ll most likely find a common thread. The perpetrators are after data, whether it’s to expose the actions of individuals as in the Ashley Madison case or to capture credit card information for financial gain.

Data governance is an area that marketers must be aware of, especially as it’s their responsibility to safeguard an ever-increasing amount of information captured through loyalty programs, social media and other sources.

Should that information fall into the wrong hands, encryption renders the data worthless. The principle is similar to the use of security tags on clothing items or protection systems in vehicles transporting large quantities of banknotes. In both cases, the aim is to make the stolen goods or money unusable by covering them in colored dye.

Both techniques are in almost universal use. But the use of encryption is not, despite the fact that technologies have been available for many years.

It seems to have been overlooked in favor of other techniques used in the battle against the many and varied IT security threats, including anti-virus, anti-malware or web filtering software. Many are still under the impression that if they have anti-virus tools in place, they will be protected.

As the way we use technology evolves we need to take a much broader view of how we protect our vital assets. Although encryption should be at the top of the list, we shouldn’t disregard other areas. If you look at the security arrangements of any clothing retailer, the tags are just one part of their security strategy, along with radio-frequency identification to minimize “shrinkage,” as it’s known in the industry, along with the deployment of security guards, impregnable shutters and alarm systems.

It’s a holistic approach and each element makes a contribution. There’s actually a holistic aspect to encryption because it can be applied on many different levels. File encryption, for example, protects individual documents, whereas device encryption disables the entire device.

Subscribe

AdExchanger Daily

Get our editors’ roundup delivered to your inbox every weekday.

The key is to understand who needs access to data and why? Does it need to be shared with agencies, mailing houses or fulfilment partners? What’s the most appropriate mechanism for sharing? Email, online transfer or portable media are all options but each presents its own challenges.

Encryption can effectively cover intrusion, such as when someone hacks into a system and steals data. It can also account for the unfortunate habit of people, often the weakest link in any security setup, leaving their phone, tablet or laptop on the train or in the back of a taxi. Encryption also offers reassurance that the increasingly sophisticated phenomenon of social engineering will have limited impact.

Historically, marketing’s desire to protect data was driven by the need to ensure that competitors couldn’t get their hands on the crown jewels. In today’s digital world the threat is far more sinister and the potential repercussions far greater.

Considering encryption’s lack of adoption across all sectors, there’s no reason to suggest that the advertising and marketing industry is ahead of the game. In a world where perception and reputation are valuable currency, perhaps it’s time to take the lead?

Follow Steve Cox (@SteveC_TSG), Technology Services Group (@TSGltd) and AdExchanger (@adexchanger) on Twitter.

Must Read

Intent IQ Has Patents For Ad Tech’s Most Basic Functions – And It’s Not Afraid To Use Them

An unusual dilemma has programmatic vendors and ad tech platforms worried about a flurry of potential patent infringement suits.

TikTok Video For Open Web Publishers? Outbrain Built It.

Outbrain is trying to shed its chumbox rep by bringing social media-style vertical video to mobile publishers on the open web.

Billups Launches Attention Measurement For Out-Of-Home

Billups, a managed services agency that specializes in OOH, is making its attention measurement solution and a related analytics dashboard available for general use.

Privacy! Commerce! Connected TV! Read all about it. Subscribe to AdExchanger Newsletters
US District Court for the Eastern District of Virginia, Alexandria

The Google Ad Tech Antitrust Case Is Over – And Here’s What’s Happening Next

Just three weeks after it began, the Google ad tech antitrust trial in Virginia is over. The court will now take a nearly two-month break before reconvening for closing arguments right before Thanksgiving.

Jounce Media's Chris Kane at Programmatic IO NY on Sept. 25, 2024.

The Bidstream Is A Duplicative, Chaotic Mess – But It Doesn’t Have To Be That Way

Publishers are initiating more and more auctions – but doesn’t mean DSPs are listening to more bids, according to Chris Kane.

Readers Are Flocking To Political News, Says WaPo – And Advertisers Are Missing Out

During certain periods this year, advertisers blocked more than 40% of The Washington Post’s inventory over brand safety concerns.