Securing data isn't easy. If it were, then cyber attacks wouldn't be occurring with such regularity. So much time, effort, and money are spent trying to secure the data, when it is becoming increasingly clear that securing the data is like trying to keep water out with a screen. No matter how narrow you small you make the holes in the screen, there are always entry points, even if you can't readily see them.

“What is needed is a different approach, one that acknowledges that you'll never have a system that is 100 percent secure, but that you can take steps to render what the hackers do find completely useless to them,” said Dr. Ray Klump, professor and director of the Master of Information Security program at Lewis University.

He suggests ensuring all your sensitive data remain encrypted while at rest. If strong data encryption is applied to all sensitive data, and plain text versions of it are never leaked to the outside, then, in the inevitability that a hacker manages to sneak through your enterprise's ultimately porous borders, what they'll find there is something they can't read. And if they can't read it, it's of no value to them.

Visit http://www.lewisu.edu/experts/wordpress/index.php/author/klumpra/ to read his blogs about computer security, computer science and math.

Visit http://www.lewisu.edu/academics/comsci/ and http://cs.lewisu.edu for more information about the Computer Science program at Lewis University.