Securing Productivity Applications

Productivity applications have changed how businesses operate and users communicate with each other. In the mobile age these applications reduce the time to exchange information and data. However, this also means there are more points of vulnerability for data loss. Anytime a word processing, spreadsheet, presentation, or image file is shared with another user, the information or data is typically not protected using encryption or password protection and resides on the recipient’s endpoint devices in the clear.

There is one main reason why this continues to occur in the modern digital age, the “human factor”. As noted earlier, the speed of exchanging information is increasing, and we have no time for additional steps even it is for protecting our data. The process of securing data is typically laborious and faulty. File encryption programs and password protection options have been around for decades. The problem is that users must perform additional steps to make it happen. Even after taking the time to protect a file, the sender must then provide the password to the recipient. Typically, the password is not sophisticate and can be broken or the password is sent in the same communication as the protected file or in the clear. Both have obvious consequences. To secure productive application data, the process must be transparent to the users and not disrupt fast-moving workflows. And once the data lands on the endpoint device, it must remain secure in case that device is compromised in the future.

Bonafeyed’s approach to “data security” focuses on the data itself and not the system, protocol or operating environment. Cy4Secure is Bonafeyed’s answer to safeguarding data no matter the data type or size, the endpoint’s mobility, or the application. Anytime data is shared, Cy4Secure quickly and transparently steps in, encrypts the data using the recipient(s) email addresses and than passes the secured data back to the host system to be forwarded off to the recipient(s).

Data protection can now be applied to embedded data. Take spreadsheets for example, Cy4Secure can be called upon to protect a cell, row, column or sheet individually so that when it is shared, only those with authorization can see the secured content. A paragraph or table within a word processing document can also be protected. When Cy4Secure protected data is lost, stolen, abandoned or forgotten, it remains secure and becomes permanently inaccessible once access is removed or retired ensuring cybercriminals or non-authorized users only obtain unintelligible data.