Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >The complexities of sharing data
    Technology

    The Complexities of Sharing Data

    Published by Gbaf News

    Posted on July 3, 2012

    6 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    Keith Ricketts, Marketing Director at Becrypt, addresses the challenges of data sharing and encryption in today’s 24/7 business environment, emphasizing the importance of policies and staff behavior in securing sensitive information.
    Keith Ricketts discussing data sharing complexities in modern finance - Global Banking & Finance Review

    Keith Ricketts, Marketing Director at Becrypt talks us through the complexities of accessing and sharing data, and explains how no matter how strong the encryption in use is, it is policies, procedures and staff behaviour that ensure a secure system.

    As organisations embrace the 24/7 culture, with the sun never setting on global markets, staff are under pressure to cram ever more into their working day.  Technology has been a great enabler, with people now working from any location, office, home and while on the move using a variety of different devices including PCs, laptops, tablets and smartphones.  Often staff now expect to have all their different devices synchronised so that they can access their documents from any of their devices in any location.  While all this is great for employees that want more flexible working arrangements, it is not so good for the Security Officer, who is tasked with safeguarding sensitive data, whether it be intellectual property, commercially competitive information or client data. Keith Ricketts

    Becrypt recently achieved EU Certification for its DISK encryption products, the first company to do so.  This means that organisations wishing to handle EU restricted data can now do so using Becrypt’s DISK Protect.  Until this time there was no easy way for government’s across Europe to share data.  Organisations in the commercial world face similar issues.  Not only do they need to keep data safe within the organisation, and with the advent of mobile and home working, this in itself is a lot more complex than it used to be, organisations also need to be sure that when data is shared with trusted third parties, that the data continues to remain secure.

    While the use of encryption and other cyber security products have an important part to play, it is how they are deployed and the policy framework around them that will ensure a robustly secure system. Modern encryption algorithms are extremely strong and typically are not directly targeted.  For this reason, cyber criminals, fraudsters and even disgruntled employees, will simply target a weak point in the system, which is often the end point.

    It is vital to have strong data security policies and procedures which are communicated clearly to all employees.  Equally important is to consider where your data is.  As organisations take advantage of cloud computing, mobile/remote working, and bring your own device (BYOD) trends, knowing where your data is, is no longer straight forward and therefore protecting it is that much more complex.

    Before any data security solution is implemented it is important do know what you are trying to achieve.  First you must decide policy, who has access to what data, and what can be shared with outside organisations.  You need to strike a balance between keeping data confidential, protecting its integrity (ensuring that it hasn’t been tampered with) and providing accessibility.

    Organisations need to think about where their data is actually stored, and particularly if using Cloud technology, where it may end up.  Additionally there could be data protection issues when data crosses national borders.  As well as encrypting data while in transit in the cloud, should it also be encrypted while at rest in the cloud?  Could an ex-employee access that data?  There needs to be processes in place to ensure that this can’t happen.

    While there is much written about hacking, denial of service and other sorts of attacks, and they are certainly on the increase, for most organisations it is the threat from within, ie. staff, that is by far the highest risk to corporate data. Whether malicious, thoughtless or just unlucky, it is a fact of life that staff will lose laptops, tablets, smartphones, and therefore the data on them. Staff education and in some cases a complete change in culture and attitudes towards data protection needs to be implemented.  Processes must be designed to ensure that policy is maintained, and that staff understand both the policy and why they need to follow it.

    Policies should ensure that a balance is maintained between keeping data secure and allowing staff access so that they can do their job.  Ideally, people should have access to no more data than they need.  It is often the amalgamation of data sets that make them sensitive, for example, the combination of names, addresses and account number information.  Each data set on their own is fairly meaningless, but when combined it becomes exponentially more sensitive, and valuable.

    Technology can be harnessed to ensure that data security procedures are easy to follow for everyone.  Encryption that works in the background on desktop PCs, laptops, tablets and even smartphones is now available.  Once they have logged on end users are not even aware of it.  Solutions are available to ensure that only authorised USB devices can be used to store data, or indeed that certain data cannot be saved to an external device.  There are other remote working solutions that enable staff to connect to the corporate network securely, even using their home PC without any possibility of the network being compromised by malware from the home PC, or any trace of the work session, included data saved, being left on the PC after the session has been completed.  Further more, this secure remote working system is carried on a USB stick, so employees don’t even need to carry a laptop, and if it is lost, as the device itself is encrypted, no data can be accessed.

    All of these systems can be managed from a central console, meaning that an engineer does not need to visit a computer to install the system, or upgrade software.  An audit trail can be produced so organisations are not only complying with legislation such as Sarbannes Oxley, Data Protection and the FSA, they can also prove that they have complied.  Should any issues arise, the IT department or the security office can be alerted immediately and rights can be repudiated remotely, if required.

    With the consumerisation of IT and staff expecting to be able to use their own devices at work, protecting data is getting more and more complex.  However, there are ways to protect sensitive data and avoiding the hefty fines and bad publicity that come with a breach.  Harnessing technology, adopting common sense policies and educating staff on the dangers of not treating data with the respect it deserves will go a long way to keeping out the headlines and ensuring that intellectual property, commercial sensitive information and valuable customer data remain protected.

     

    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Technology

    Explore more articles in the Technology category

    Image for Innovation Through Partnership: The Role of External Tech Teams
    Innovation Through Partnership: The Role of External Tech Teams
    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Image for Call for Entries: Best Digital Wallet 2026
    Call for Entries: Best Digital Wallet 2026
    View All Technology Posts
    Previous Technology PostManaging Cash Collection Using Intuitive Dashboards and Alloc8
    Next Technology PostSkySQL Arrives in the UK to Help Financial Services Industry Cut Costs