• Warning: Illegal string offset 'name' in fierce_js_init() (line 6 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/custom/fierce_js/fierce_js.module).
  • Warning: Illegal string offset 'url' in fierce_plugins_site_footer_content_type_render() (line 150 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/site_footer/site_footer.inc).
  • Warning: Illegal string offset 'signup_url_footer' in fierce_plugins_site_footer_content_type_render() (line 151 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/site_footer/site_footer.inc).
  • Warning: Illegal string offset 'contact_url' in fierce_plugins_site_footer_content_type_render() (line 154 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/site_footer/site_footer.inc).
  • Warning: Illegal string offset 'mobile' in fierce_plugins_site_footer_content_type_render() (line 155 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/site_footer/site_footer.inc).
  • Warning: Illegal string offset 'url' in fierce_plugins_site_footer_content_type_render() (line 156 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/site_footer/site_footer.inc).
  • Warning: Illegal string offset 'url' in fierce_plugins_site_footer_content_type_render() (line 158 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/site_footer/site_footer.inc).
  • Warning: Illegal string offset 'jazd' in fierce_plugins_jazd_hottest_products_content_type_render() (line 32 of /mnt/www/html/fiercemarkets/docroot/sites/all/modules/fierce_plugins/plugins/content_types/jazd_hottest_products/jazd_hottest_products.inc).

How to protect your data from the NSA

Tools

In the wake of the revelation of widespread NSA spying, implementing proper information security has suddenly become a much more significant issue. This is true even for businesses that are completely on-the-level, and don't mind the NSA getting the lowdown of their business dealings.

With this in mind, The Register wrote a detailed guide on how it's possible to safely transfer electronic communications between two parties. I outlined the key steps of the article below.

  • Implement private-public key encryption for your data
  • Make use of AES-256 encryption for security
  • Use 'clean' physical machines for data transmissions
  • Host the data transfer apps within a virtual environment for added security
  • Set up a hidden service routed through Tor

The Fierce Take: While it is unlikely that an enterprise will go to such lengths in the name of security, the guide makes for an interesting read, and also serves as a somber reminder of how vulnerable data communications can be.

For more:
- check out this article at The Register

Related Articles:
Snowden used USB flash drive to breach NSA's security
Mobile data security weaker than you think