Friday 7 August 2015

How to use Encryption Privacy Tools to Evade Corporate Espionage

ICIT’s most recent briefing entitled “How to Use Encryption and Privacy Tools to Evade Corporate Espionage” has been authored at the request of multiple entities who wish to take a proactive approach to minimizing their organization’s cyber attack surface.  Through the use of encryption and privacy control mechanisms, ICIT offers the reader step-by-step protocols  that make use of free and/or open source encryption and anonymizing technologies (GPG, Tor, Jabber, etc. ) that eliminate many of the capabilities bad actors use to monitor and breach these organizations.

Entities who routinely hold and transmit sensitive files are considered high-risk targets for cyber attacks.  Organizations that fall under this category include law firms, pharmaceutical researchers and investment banking firms, among others.  This brief has been written to serve as a reference manual for at-risk entities so they may minimize their attack surface  while anonymizing themselves from the hacktivists and nation states wishing to cause them harm.

Click HERE to download this brief.

 

View the original content and more from this author here : http://ift.tt/1Nfweye



from cyber security caucus http://ift.tt/1gQjzb6
via IFTTT

No comments:

Post a Comment