{"id":14059,"date":"2015-04-25T03:00:40","date_gmt":"2015-04-25T10:00:40","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/?p=14059"},"modified":"2017-06-04T11:59:20","modified_gmt":"2017-06-04T18:59:20","slug":"a-way-to-hide-corporate-data-from-hackers","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2015\/04\/a-way-to-hide-corporate-data-from-hackers","title":{"rendered":"A Way to Hide Corporate Data from Hackers"},"content":{"rendered":"<p>By <a href=\"http:\/\/www.technologyreview.com\/contributor\/tom-simonite\/\">Tom Simonite<\/a> \u2014 MIT Technology Review<br \/> Social-security and credit-card numbers frequently leak or are stolen from corporate networks\u2014and surface on the black market. Adam Ghetti, founder of <a href=\"https:\/\/ionicsecurity.com\/\" target=\"0\">Ionic Security<\/a>, says he has invented technology that could largely end the problem. His software keeps corporate data such as e-mails and documents encrypted at all times, except for when someone views it on an authorized computer or mobile device.<\/p>\n<p>Workers at a company using Ghetti\u2019s system can create and exchange e-mails or documents as normal. But Ionic\u2019s software invisibly encrypts what they type on the fly. If someone tries to load a stolen document on a computer outside the company\u2019s network, they would see only the encrypted data\u2014a jumbled string of letters. \u201cA network breach no longer has to mean a data breach,\u201d says Ghetti.<\/p>\n<p><a href=\"http:\/\/www.technologyreview.com\/news\/536681\/a-way-to-hide-corporate-data-from-hackers\/\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Tom Simonite \u2014 MIT Technology Review Social-security and credit-card numbers frequently leak or are stolen from corporate networks\u2014and surface on the black market. Adam Ghetti, founder of Ionic Security, says he has invented technology that could largely end the problem. His software keeps corporate data such as e-mails and documents encrypted at all times, [\u2026]<\/p>\n","protected":false},"author":76,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,77],"tags":[],"class_list":["post-14059","post","type-post","status-publish","format-standard","hentry","category-business","category-hacking"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/14059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=14059"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/14059\/revisions"}],"predecessor-version":[{"id":64751,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/14059\/revisions\/64751"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=14059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=14059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=14059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}