<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data security | Kielburger IT-Consulting</title>
	<atom:link href="https://kielburger.de/en/tag/data-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://kielburger.de/en</link>
	<description>Individual Consulting.</description>
	<lastBuildDate>Sun, 26 May 2024 21:15:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://kielburger.de/wp-content/uploads/cropped-K_1000px_transp-32x32.png</url>
	<title>Data security | Kielburger IT-Consulting</title>
	<link>https://kielburger.de/en</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Easy and Secure: Email Encryption</title>
		<link>https://kielburger.de/en/pgp/</link>
		
		<dc:creator><![CDATA[Patrick]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 18:01:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Anleitung]]></category>
		<category><![CDATA[Asymmetric key algorithms]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[E-Mail-Verschlüsselung]]></category>
		<category><![CDATA[Email encryption]]></category>
		<category><![CDATA[Encryption tools]]></category>
		<category><![CDATA[Enigmail]]></category>
		<category><![CDATA[Kommunikation]]></category>
		<category><![CDATA[OpenPGP]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Pretty Easy Privacy (PEP)]]></category>
		<category><![CDATA[Sicherheit]]></category>
		<category><![CDATA[Thunderbird]]></category>
		<guid isPermaLink="false">https://kielburger.de/?p=760</guid>

					<description><![CDATA[<p>Enhance email security with PGP encryption. OpenPGP ensures data safety. PEP simplifies encryption processes for secure communication.</p>
The post <a href="https://kielburger.de/en/pgp/">Easy and Secure: Email Encryption</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></description>
										<content:encoded><![CDATA[<p>In the early days of the internet, communication usually happened unencrypted. In this time an email used to be as secure as a postcard. Everyone who had access to any point of the transfer was able to read along.<br />
Only in the last few years, data communication started to be encrypted, fe. with SSL. But SSL only encrypts the transmission of the data, not the data itself.<br />
There is generally speaking no guarantee that anyone of the involved email servers is actually using secure encryption methods. Also, email messages are stored unencrypted in the postboxes of providers. Often times postboxes had been compromised (&#8220;hacked&#8221;). Usually, hackers do not target to attack a single person. They rather try to generally find security leaks and take advantage of them. Security leaks can be weak password or weak systems for example.</p>
<p>In order to defend against that, it is possible to encrypt the whole email message instead of only encrypting the transfer. The standard PGP (&#8220;pretty good privacy&#8221;) allows it. Other than the name may suggest, this system is actually really safe instead of being &#8220;pretty good&#8221;. And thanks to OpenPGP it is also open-source and freely available.</p>
<p>Please feel free to skip the following paragraph if you don&#8217;t like things to be too technical. For our email encryption, PGP uses asymmetric key algorithms. The recipient (person A) of a message has a private key. It is needed to decrypt a message. The sender (person B) needs the public key of person A for the encryption of the message. Person A, the recipient, needs to transmit this public key to person B before encryption can happen. After that, person B will be able to encrypt and send a message with the public key of person A. As long as person A keeps its private key safely on its PC, only person A will be able to read its messages.<br />
In order to send a message from person A to person B, person A needs the public key of person B.<br />
If there are any doubts about a person really being who the person claims to be, a so called &#8220;handshake&#8221; can be performed. In practice, this means the exchange of security words away from keyboard. The security words can be transmitted on the phone or in real live. This makes the email conversation not only secure, but also reliable.</p>
<p>Honestly, this sounded complicated. And it actually used to be complicated for a long time. Thanks to a project called PEP (&#8220;Pretty Easy Privacy&#8221;) it got really easy now. PEP can be installed as an add-on for some email client programs and will take care of everything regarding encryption. This includes generating, attaching and importing of public keys and also generating a private key and decrypting incoming encrypted messages. If the conversational partners are using OpenPGP without PEP, it is still possible to communicate encrypted. Add-Ons with PEP like Enigmail are freely available for email clients like Thunderbird. There are also commercial extensions, for example for Outlook.</p>
<p>The following lines are supposed to show how you can encrypt your email conversations -completely free- with Thunderbird and the Add-On Enigmail with PEP. The following pictures have been made on a GNU/Linux-based operating system with Thunderbird 60.7.0 (64-bit). The operation can be different with other operating systems and software versions.</p>
<h4><strong>Step 1: Open Menu (1) in Thunderbird and click on Add-Ons twice (2).</strong></h4>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-764 size-full" src="https://kielburger.de/wp-content/uploads/10.png" alt="" width="1168" height="718" srcset="https://kielburger.de/wp-content/uploads/10.png 1168w, https://kielburger.de/wp-content/uploads/10-300x184.png 300w, https://kielburger.de/wp-content/uploads/10-768x472.png 768w, https://kielburger.de/wp-content/uploads/10-1024x629.png 1024w" sizes="(max-width: 1168px) 100vw, 1168px" /></p>
<h4><strong>Step 2: Search for the Add-On &#8220;Enigmail&#8221;.</strong></h4>
<p><img decoding="async" class="alignnone wp-image-768 size-full" src="https://kielburger.de/wp-content/uploads/20.png" alt="" width="938" height="355" srcset="https://kielburger.de/wp-content/uploads/20.png 938w, https://kielburger.de/wp-content/uploads/20-300x114.png 300w, https://kielburger.de/wp-content/uploads/20-768x291.png 768w" sizes="(max-width: 938px) 100vw, 938px" /></p>
<h4><strong>Step 3: Install Enigmail (self-explaining)<br />
<img decoding="async" class="alignnone size-medium wp-image-771" src="https://kielburger.de/wp-content/uploads/40-300x207.png" alt="" width="300" height="207" srcset="https://kielburger.de/wp-content/uploads/40-300x207.png 300w, https://kielburger.de/wp-content/uploads/40.png 546w" sizes="(max-width: 300px) 100vw, 300px" /> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-772" src="https://kielburger.de/wp-content/uploads/50-300x27.png" alt="" width="300" height="27" srcset="https://kielburger.de/wp-content/uploads/50-300x27.png 300w, https://kielburger.de/wp-content/uploads/50-768x70.png 768w, https://kielburger.de/wp-content/uploads/50.png 983w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </strong></h4>
<p><strong>Enigmail automatically creates a private and a public key in the background. There is nothing to do for you. The picture just illustrates that a new key has been created.</strong><img loading="lazy" decoding="async" class="alignnone size-full wp-image-773" src="https://kielburger.de/wp-content/uploads/60.png" alt="" width="706" height="477" srcset="https://kielburger.de/wp-content/uploads/60.png 706w, https://kielburger.de/wp-content/uploads/60-300x203.png 300w" sizes="auto, (max-width: 706px) 100vw, 706px" /></p>
<h4><strong>Step 4: Importing the first key</strong></h4>
<p><strong>We receive an email from someone who is also using PGP-based encryption. Enigmail automatically recognizes that a public key is attached to the email. If we want to answer or send a regular email to this participant, it will be automatically encrypted.<img loading="lazy" decoding="async" class="alignnone size-full wp-image-774" src="https://kielburger.de/wp-content/uploads/70.png" alt="" width="792" height="554" srcset="https://kielburger.de/wp-content/uploads/70.png 792w, https://kielburger.de/wp-content/uploads/70-300x210.png 300w, https://kielburger.de/wp-content/uploads/70-768x537.png 768w" sizes="auto, (max-width: 792px) 100vw, 792px" /><br />
</strong></p>
<h4><strong>Step 5: Sending the first encrypted email and eventually performing a handshake</strong></h4>
<p><strong>PEP shows, that this message is secure. This means, that right now we are sending this message encrypted. Our own public key will be automatically attached. Therefore the recipient will be able to encrypt its answer message.<br />
Eventually we also want to secure the trust between us and the recipient of this email by performing a handshake. This is not mandatory, though.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-775" src="https://kielburger.de/wp-content/uploads/80.png" alt="" width="866" height="718" srcset="https://kielburger.de/wp-content/uploads/80.png 866w, https://kielburger.de/wp-content/uploads/80-300x249.png 300w, https://kielburger.de/wp-content/uploads/80-768x637.png 768w" sizes="auto, (max-width: 866px) 100vw, 866px" /><br />
By clicking on the yellow-marked area &#8220;Secure&#8221; the handshake can be arranged. PEP will give self-explaining instructions about this. If you want to perform a handshake, it has to be re-done for each participant you are communicating with.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-776" src="https://kielburger.de/wp-content/uploads/90.png" alt="" width="656" height="527" srcset="https://kielburger.de/wp-content/uploads/90.png 656w, https://kielburger.de/wp-content/uploads/90-300x241.png 300w" sizes="auto, (max-width: 656px) 100vw, 656px" /><br />
</strong></p>
<h4><strong>Done. We have just massively increased the security of our email conversations.</strong></h4>
<p><strong>Hints:</strong></p>
<ul>
<li>Even if the email itself is encrypted, the transmission should still be secured with SSL. Only by encrypting the transmission it can be assured that meta data and passwords are also transferred encrypted.</li>
<li>If our interlocutor does not use any type of PGP/PEP/OpenPGP-encryption, we won&#8217;t be able to communicate encrypted with that person. It always takes two! Enigmail with PEP will always show you if a message will actually be sent encrypted.</li>
<li>Whenever we receive an encrypted message, it can only be decrypted with our private key. Therefore it makes sense to have backup of our key that is stored secure and privately, fe. on an encrypted USB flash drive.</li>
<li>Reading encrypted messages is generally only possible with an email client program like Thunderbird. Reading encrypted messages on the web, fe. at GMail or Hotmail is only possible with a few providers with browser add-ons. Not every provider allows reading encrypted messages and some do only with limitations.</li>
</ul>
<p>Please be aware, that all of this informations and/or tutorials come without any type of warranty.</p>The post <a href="https://kielburger.de/en/pgp/">Easy and Secure: Email Encryption</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secure And Accessible: What Matters About Cloud Storage</title>
		<link>https://kielburger.de/en/cloud-storage/</link>
		
		<dc:creator><![CDATA[Patrick]]></dc:creator>
		<pubDate>Tue, 05 Apr 2016 07:00:31 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data backup]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Datenschutz]]></category>
		<category><![CDATA[Datensicherheit]]></category>
		<category><![CDATA[flexible Datenverwaltung]]></category>
		<category><![CDATA[kostengünstig]]></category>
		<category><![CDATA[Online storage]]></category>
		<category><![CDATA[Online-Speicherung]]></category>
		<category><![CDATA[Secure transfer]]></category>
		<category><![CDATA[weltweiter Zugriff]]></category>
		<guid isPermaLink="false">https://kielburger.de/?p=425</guid>

					<description><![CDATA[<p>Protect your valuable data with secure online storage solutions. Ensure data safety against hazards like fire, theft, and data misuse.</p>
The post <a href="https://kielburger.de/en/cloud-storage/">Secure And Accessible: What Matters About Cloud Storage</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></description>
										<content:encoded><![CDATA[<p>Data is incredibly valuable. Old photos, vhs cassettes or the contract you bought you house with are just examples of documents that nobody wants to lose. Important data of the business like balance sheets, receipts, customer data or presentations are more usable if they can be accessed by every employee that is responsible for the specific document.<br />
Nowadays this data is probably saved on a computer. And if this is a single personal computer, the data wouldn&#8217;t be very safe there. Every hard disk only has a<strong> limited life span</strong> and can end its life anytime.</p>
<figure id="attachment_443" aria-describedby="caption-attachment-443" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="wp-image-443 size-medium" src="https://kielburger.de/wp-content/uploads/fire-717504_1280-300x246.jpg" alt="Fire" width="300" height="246" srcset="https://kielburger.de/wp-content/uploads/fire-717504_1280-300x246.jpg 300w, https://kielburger.de/wp-content/uploads/fire-717504_1280-768x629.jpg 768w, https://kielburger.de/wp-content/uploads/fire-717504_1280-1024x839.jpg 1024w, https://kielburger.de/wp-content/uploads/fire-717504_1280.jpg 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-443" class="wp-caption-text">Fire</figcaption></figure>
<p>What happens to the hard disk in <strong>case of a fire or a flood</strong>? If the home- or company-computer gets <strong>stolen</strong>, there is an additional risk besides the loss of data. Data can be <strong>dangerously misused</strong> by the thief. Especially the home user is almost unable to ensure for all those hazards. It is a big task to ensure redundancy alongside security against fire, water and theft.<br />
This is why more and more people are looking for <strong>storage in the internet</strong>. The private data will be transferred using a (mostly secured) connection to the hard disk of a computer in a <strong>data center</strong>. Such a data center is not just always monitored by a <strong>security staff</strong>, but also has strong <strong>protection against fire, flood and power failure</strong>. The data may also be <strong>saved to more than one hard disk</strong>, so that it won&#8217;t get lost in case of a failure of a single disk. All of this is generally speaking possible for <strong>less than one Euro per month</strong>.</p>
<figure id="attachment_440" aria-describedby="caption-attachment-440" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class="wp-image-440 size-medium" src="https://kielburger.de/wp-content/uploads/hard-disk-1071668_1280-300x200.jpg" alt="Hard Disk" width="300" height="200" srcset="https://kielburger.de/wp-content/uploads/hard-disk-1071668_1280-300x200.jpg 300w, https://kielburger.de/wp-content/uploads/hard-disk-1071668_1280-768x512.jpg 768w, https://kielburger.de/wp-content/uploads/hard-disk-1071668_1280-1024x682.jpg 1024w, https://kielburger.de/wp-content/uploads/hard-disk-1071668_1280.jpg 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-440" class="wp-caption-text">Hard Disk</figcaption></figure>
<p>It is also remarkable that more pre-defined <strong>users</strong> are able to <strong>access the same data</strong>. That way, two or more people would be able to work at the same project even if they are in <strong>totally different places of the world</strong>. Or just in the neighbor town.<br />
This is why online storage is especially interesting for clubs and companies. It is possible that, for example, all the board members of a club can access the club&#8217;s members list.<br />
The definition of more users to have access to the online storage usually leads to add-on fees.</p>
<p>The acquisition of online storage is also attractive in combination with <strong>converged devices</strong>. That way the private surveillance camera can regularly upload a picture of the house. The home owner will then be able to control the status of his house right from the beach at its holiday destination.<br />
Especially when dealing with sensible data, the<strong> choice of the provider becomes very significant</strong>. There are big differences when it gets to the security of transfer and storage. The software offered by the provider might also be a big key point. Especially the big players force the customer to use their own software, which might not be compatible with the home envoirement or lead to significant limitations.</p>
<figure id="attachment_445" aria-describedby="caption-attachment-445" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="wp-image-445 size-medium" src="https://kielburger.de/wp-content/uploads/binary-715768_1280-300x212.jpg" alt="Illustration" width="300" height="212" srcset="https://kielburger.de/wp-content/uploads/binary-715768_1280-300x212.jpg 300w, https://kielburger.de/wp-content/uploads/binary-715768_1280-768x543.jpg 768w, https://kielburger.de/wp-content/uploads/binary-715768_1280-1024x724.jpg 1024w, https://kielburger.de/wp-content/uploads/binary-715768_1280.jpg 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-445" class="wp-caption-text">Illustration</figcaption></figure>
<p>Not every provider is able to ensure that your own data is really kept secret. A unintentional publication of data can lead to ugly consequences. Pitiable destinies caused by this issue are all over the news.<br />
It is also important, that data still belongs to its creator from a legal perspective even if it is stored at a computer far away.<br />
Deleted data needs to be erased safely, so it won&#8217;t get into the wrong hands.<br />
Limitations by the provider regarding data transfer, used protocols or the size of single files can lead to add-on fees or just limit the usability.<br />
After all, it has to be considered, that the <strong>internet connection is always utilized when transferring data</strong>. Even if someone has a fast internet connection, this person could still notice delays. A lot of internet connections receive data faster then they send it to the internet. When in a volume-based pricing models (mostly used for mobile or satellite connections), transferring a lot of data could lead to additional fees. Generally all of this has to be taken into consideration, but it won&#8217;t lead to any big issues.<br />
With all this things considered, a reasonable solution can be found with the German provider <strong>STRATO</strong>. They will fulfill almost all of the previously discussed criteria. Limitations with the usable protocols should be considered. For example the usage of FTP can lead to additional fees.<br />
<strong>Kielburger IT-Consulting</strong> also offers its <strong>own solutions</strong> for online storage. Those will be individually planned and realized.</p>
<p><a href="http://telekom.kbitc.de" target="_blank" rel="noopener noreferrer">Go to STRATO</a> (Please choose &#8220;STRATO&#8221; in the &#8220;Internet&amp;Festnetz&#8221; menu)</p>The post <a href="https://kielburger.de/en/cloud-storage/">Secure And Accessible: What Matters About Cloud Storage</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
