As part of this weeks summer cyber security webinar about encryption, I touched on the idea of how it can support the confidentiality, integrity and availability (CIA) of your information. In this article we are going to expand on the CIA theme so you can see how encryption can help.
This is the second part of my article on CIA principles. The first part is available on Smart Thinking Solutions:

CIA – Availability
The most secure system you can have is one that no one can access or alter – except that is useless for getting any work done!
We used to think air-gapped systems were highly secure – but maybe not any more.
But in our real world we need systems that are secure, that can be trusted to be accurate, whilst also being available to users and stakeholders so work can be done and information accessed.
Things are easier for smaller organisations today with the functionality offered by Microsoft 365 and Google WorkSpace. These business tools enable excellent availability and sharing tools with the addition of extensive monitoring and logging to maintain integrity.
You may use other systems, but you will have to access their availability for yourself – if you choose a slow, insecure but cheap server for your online shop then expect trouble. If the new app you want your team to use is slow or worse it cannot be trusted, expect to be buried with complaints!
CIA and Back-up
One more thing I want to add here to support all of the above, is that a comprehensive, compliant back-up is an absolute necessity to all organisations to maintain the CIA triad when things go wrong.
The Summer Webinars

It is not too late to register – whenever you register you will be given access to the recordings of previous seminars you have missed. Topics still to come:
Bond… James Bond
I want to sell you a bridge
Leaky boat
You don’t want the bridge… I know a Prince
Invest just thirty minutes of your time in improving the cyber security of your organisation – the sign-up link is here.
Clive Catton MSc (Cyber Security) – by-line and other articles
Further Reading
Hack Me If You Can! What’s your excuse? | Smart Thinking Solutions
Ransomware Resilient Back-up | Smart Thinking Solutions
Photo by cottonbro studio