Posts by Category

The importance of encrypting your everyday company communications

In 2015, a WIRED contributor made the bold case that the most secure consumer device was an Apple iPod Touch. He highlighted its combination of a highly vetted software ecosystem and a lack of cellular network connectivity, but made a lot of caveats along the way. For starters, it needed to be physically secured, kept up to date, and used in tandem only with encrypted communication apps.

While the author’s overall recommendation to keep using an iPod is impractical for many professionals, the argument’s basic points about encryption are worth noting:

Data encryption technology is essential for shielding sensitive interactions from unwanted surveillance and interception.

At the same time, it must be combined with acceptable security practices, such as proper handling of keys, scalable update or patch management, and access controls.

Read more