Wanna know all about Sher.ly?

Leave your e-mail to get the newest info about Sher.ly and Sherlybox. We won't SPAM. Promise :)

Leave us your e-mail to be the first to get Sher.ly news!

Data security is all about who holds the keys


Do you know who holds the keys to your data? Your personal documents, financial records, bank statements, your businesses intellectual property and trade secrets?





When you store files in the public cloud, no matter how strong your passwords, you don’t have the keys to what is probably a collection of your most important documents. In essence, it’s locking the door, the garage, the back door, all the windows, setting the alarm, then leaving the key outside with the alarm code on a scrap of paper.


Bet you aren’t feeling so secure anymore.


Me either.


Here’s How “Data Encryption” Works In Reality


Companies who offer encryption as a feature of their products do what they say. They encrypt the data, whatever it is - emails, documents, images. They do this on their servers. Then they send the keys to that data to the customer.

Data security


Which means the keys are in two places, with the customer and the company. Not only leaving the data twice as vulnerable, but the keys to your data are now with a third party. They can access it at any time, or give them to someone else, like the NSA, or they themselves could be the target of a digital raid. Criminal cyber gangs see public cloud firms as a lucrative source of consumers personal information, which is a commodity with countless illegal money-spinning uses.



What About Data In Transit?


Also a noteworthy consideration, both in the eyes of the law and when it comes to security.


SSL encryption protects your network traffic. It is prevention against people snooping on or decrypting data when it is in transit. Usually going from a cloud hard drive to a device, or between servers, if it goes over the internet. Disk level encryption is designed to protect the data when it’s at rest. Theoretically, SSL and disk encryption should keep your documents safe whether at rest or in transit.


But the keys are still in both places - your devices and the companies servers. Which kind of undermines the whole, Your data is safe with us! idea.



What’s the Solution?


The only solution, for true security, is for you to have the keys to the kingdom. It’s your data, after all. You wouldn’t hand random strangers house keys if they promise not to take anything. Or promise to keep out their shady looki

keys img1
ng friends.


You holding the keys, along with data being encrypted before it leaves a secure device (like Sherlybox) and a strong password policy: that’s true security. No more keys lying around for anyone to pick up or steal. 

Liked this post? Sign up for our weekly newsletter to get the latest updates: