Because the assault floor expands and the menace panorama grows extra advanced, it’s time to contemplate whether or not your information safety technique is match for goal
05 Sep 2025
•
,
5 min. learn

A single safety breach can jeopardize every little thing you’ve constructed. The theft of mental property and confidential buyer information can lead to a cascade of penalties, from hefty monetary losses and a shattered model repute to finally the specter of placing the whole way forward for your organization in danger.
In keeping with IBM’s Value of a Knowledge Breach Report 2025, the typical value of an information breach stands at practically $4.5 million. However the determine might attain many occasions that relying on what kind of information is stolen.
Stats like these ought to make protecting measures similar to information encryption a no brainer. Actually, 87% of companies mentioned final 12 months that they’d enhance funding in encryption . If your corporation isn’t becoming a member of them, it could be price asking why.
Why do you want encryption?
By reworking plain textual content information into an unreadable format, information encryption serves to guard your group’s most delicate info, whether or not at relaxation or in transit. There are various causes for wanting to take action. These embrace:
- Distant working: Almost a quarter of US staff work at home at the least a number of the time. This creates additional dangers across the instruments they use to take action, and the information saved and accessed through these instruments. Private laptops and units is probably not as safe as their company equivalents.
- A knowledge explosion: International companies are creating extra information than ever. It’s anticipated that 181 zettabytes will probably be generated in 2025, which means that there’s extra for adversaries to steal and maintain to ransom, and extra likelihood of it being by chance leaked. From prospects’ personally identifiable info (PII), to delicate IP, monetary information, and M&A plans, if these develop into compromised, there are probably critical repercussions in retailer. The info explosion can also be accelerating due to progress in AI and huge language fashions (LLMs), which require enormous volumes of probably delicate information to coach.
- Machine loss/theft: As extra staff adapt to a hybrid working setting, there’s a better threat that the laptops, tablets and different cellular units they carry with them are misplaced or stolen. If not protected, the information saved or accessed through these could possibly be compromised.
- Third-party threats: Menace actors proceed to get higher at breaching company cyber defenses. Final 12 months within the US alone there have been over 3,100 particular person information compromises, leading to breach notifications being despatched to greater than 1.3 billion victims.
- Underperforming safety: It’s getting more and more simple to bypass conventional defenses on the company “perimeter” by merely utilizing stolen, guessed or phished credentials belonging to staff. Credential abuse accounted for preliminary entry in a fifth (22%) of information breaches final 12 months, with phishing at 16%, says Verizon. Infostealers are a rising headache. One report claims that 75% (2.1 billion) of three.2 billion credentials compromised in 2024 have been stolen through infostealer malware.
- Ransomware: Encryption can also be a weapon wielded by attackers, and menace actors are inflicting rising issues for community defenders with ransomware and information extortion schemes. Ransomware was current in 44% of all information breaches final 12 months, a 37% annual enhance, in line with Verizon. An encryption answer can’t cease the dangerous guys from locking you out of your information, however it can render something they steal ineffective. As the specter of AI-driven ransomware looms ever bigger, the necessity for a complete information safety technique has by no means been better.
- Insecure communications: A lot of the world communicates through end-to-end encrypted messaging platforms, however most companies nonetheless perform on e mail. Sadly, e mail wasn’t designed with safety as a core, built-in characteristic, and until it’s end-to-end encrypted it may be a juicy goal for eavesdropping and interception. In an effort to hold delicate information protected from prying eyes, encryption that scrambles the e-mail content material from the sender’s machine till it reaches the recipient’s machine needs to be a non-negotiable line of protection.
- Insider threats: Verizon claims 18% of breaches concerned inner actors final 12 months, rising to 29% in EMEA. Though many of those incidents are attributable to carelessness fairly than malice, circumstances like the Coinbase breach spotlight the persistent menace from the latter.
The price of poor information safety
In case your company information results in the mistaken palms, it might result in:
- Main monetary prices (IBM lists detection and escalation actions; notification of regulators, information topics and third events; post-breach response; and misplaced enterprise).
- Reputational injury. Buyer loyalty is difficult gained and simply misplaced: 94% of organizations Cisco spoke to assert their prospects wouldn’t purchase from them if they didn’t correctly shield their information.
- A major compliance burden: Laws and requirements together with DORA, NIS2, GDPR, HIPAA, CCPA, and PCI DSS 4.0 all demand information encryption in some kind.
It’s additionally price contemplating the cyber-insurance context of information safety. Carriers both could not insure your corporation if it doesn’t deploy sturdy information encryption, or else enhance premiums.
What sort of encryption works greatest?
Encryption scrambles plaintext information utilizing a specialised algorithm and encryption key(s). Remember to select merchandise primarily based on confirmed, sturdy algorithms like AES-256 that supply a excessive stage of safety. However past this, you will have to determine on the answer that most closely fits your wants. There are merchandise designed particularly for encrypting databases, and cloud environments, for instance.
Probably the most in style varieties of information safety is full-disk encryption (FDE). This scrambles information on system disks, partitions and whole drives throughout laptops, desktops and servers. When evaluating options, look out for options that supply sturdy encryption (AES-256), cross-platform help (throughout Home windows and macOS, for instance), versatile licensing, centralized management from a single admin portal, and minimal end-user interplay.
Relying in your necessities, you may additionally be inquisitive about an encryption answer that covers:
- Information and folders, digital disks and archives: Helpful for delicate information that have to be shared or saved in unencrypted environments (e.g., in case you have a shared units coverage).
- Detachable media: To guard information residing on any USB drives or comparable from theft or loss.
- Electronic mail and attachments: Encrypting information in transit will assist guarantee solely the supposed recipient will be capable of learn e mail content material.
It’s attainable to get many of those capabilities in encryption options with centralized administration, like these supplied by ESET.
Bringing all of it collectively
Knowledge encryption is a much-needed line of protection that needs to be one of many important layers of any fit-for-purpose safety technique. On the identical time, it’s all the time necessary to do not forget that it really works greatest as considered one of a number of safeguards and layers of safety. Safety software program throughout all units, sturdy entry controls, together with multi-factor authentication (MFA), vulnerability and patch administration, file server and cloud software safety, and end-user safety consciousness coaching will all go a great distance towards maintaining your corporation protected.
In a world of repeatedly evolving threats, take into account proactive protection that comes with superior EDR/prolonged detection response (XDR) and gives important detection capabilities throughout endpoint, e mail, cloud and different layers, plus response and menace searching in actual time. For firms which can be brief on sources, managed detection and response (MDR) providers can do the heavy lifting, pairing industry-leading prevention, detection and response capabilities with world-class safety analysis and menace intelligence.