Protect your e-mail with World War 2 era encryption [LINK]. By their very nature, networks are open. They encourage sharing of data, especially in a cloud computing environment. As recently as a few years ago, it was easy to protect networks by declaring a perimeter at the controlled routers, and having an understanding with the network transport systems outside the perimeter. Nowadays we are increasingly reliant on cloud computing, where we control neither the hardware nor the software housing the data on the cloud. The only way to protect our information is to protect it as the data level. To protect data at this level, it becomes more incumbent upon the user to control the security of the data, and less contingent upon the system administrators’ network settings. The difference here is that in a cloud computing environment, your network administrator only controls a small portion of the transport of the data. The network administrator can only control the security of that computer you are typing out the PowerPoint slide or e-mail. Once that PowerPoint document gets uploaded to DropBox or e-mailed to the recipient, the network administrator no longer affects the security of the data.
Rune Information Systems has a system called Deadbolt that is based on World War 2 Vernam encryption. The user has software and hardware on hand to generate privacy keys to protect critical messages. Only a user that has the key can unlock the message. This could be used to protect e-mails, or even private messages on LinkedIn or Facebook. It will not protect Facebook wall posts or anything like that. If you wanted the data secure you would not be posting it publicly on a wall, right?
The catch is that the user needs to carry a special USB stick, and both ends of the conversation will need some software to decrypt the message.