To Encrypt or Not To Encrypt

In nature as well as technology, there is a constant jockeying for position between rival factions. The moon follows the sun and hackers lurk in the shadows of innovation.

The seesaw battle between technology and security breaches is as old as cave communities protecting information over the whereabouts of a saber-tooth tiger. The arrival of the printed word jump started this chess match to a new level and with emails, document sharing , and public clouds, the game has become a daily highlight reel.

Earlier this summer the professional social networking site LinkedIn suffered a security breach compromising an estimated 6 million of its user’s passwords. The New York Times Technology writer Nicole Perlroth hinted that the passwords of LinkedIn users were only “lightly encrypted.”

Cookeyah designers were well aware of the importance of encryption. The innovative technology company complimented voice biometric authentication with three of the industry’s most well-respected encryption families.

Encryption is a highly effective tool to protect data. It involves the transfer of information like text into an unreadable format. The transfer is performed by algorithms and the data remains encrypted or unreadable until a key is granted.

In the aftermath of the Enron scandal, governments passed stricter legislation like the Sarbanes-Oxley Act to enforce data security. The industry however, is still very much a wild west with companies seeking shortcuts at the expense of security.

Hackers utilize all the available resources to penetrate systems. They behave like mice who enter homes by any means necessary. They pass through existing holes and create new ones. The enemy is as relentless as the innovator who designed the house or innovative software. That’s the nature of the game.

Data security systems cannot depend solely on a strong authentication mechanism. Cookeyah’s integration of the human voice as the sole password was no cause for celebration. The company’s innovators set to work on complimenting voice biometric with a ground breaking encryption technique. The result is a standard that paves the way for real security without compromising ease of use.

Cookeyah and its parent company Trusttle rely on the three most respected algorithms for encrypting data: AES, 3DES and RSA.  Three independent algorithms acting simultaneously, provide, you guessed it, three layers of protection. Think of it as three separate locks on a door. If one layer or lock is compromised, your house still remains secure.

The length of the keys Cookeyah provides for the purposes of decryption is close to the maximum implemented by the existing technology, a far more than secure 2048 bits. Each layer of encryption requires a separate key. A hacker would need three entirely different keys beyond imaginable size in order to penetrate Cookeyah’s defense.

We perform an increasing number of activities on the go through our mobile devices. This means data travels along new and more vulnerable channels. We make bank deposits, check Facebook accounts, and of course, access our Cookeyah Password Bank. We can no longer afford to not be protected for the hacker never rests. The game must go on!

Complete Cookeyah Registration on its website and enjoy the free software.

…authenticate with your own voice
http://cookeyah.com/

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s