In summary, the most effective course of action is to partner with a vendor or your solutions provider to ensure the encryption technology you implement actually does what it says it promises "on the box."
Take responsibility for encrypting all data, whether you move it into a cloud service like Box or Salesforce, and bring your own key so the service providers are not able to access files without first receiving permission from your users.
In today’s connected society where organizations are increasingly migrating applications and information stores from on-premises to the cloud, we will never be secure against cyberattacks without strong encryption. Today’s cyberattacks are becoming more complex, with advanced attackers using multiple points of entry to get around security software. Encryption is the last line of defense in a cybersecurity strategy that requires multiple layers of protection.
Sign up for CIO Asia eNewsletters.