Wednesday, 13 July 2016

It's time to think of cybersecurity as a business enabler: VeilMail in Afghanistan

Author: William H. Saito
Named by Nikkei as one of the "100 Most Influential People for Japan," William H. Saito is Special Advisor of the Cabinet Office and Prime Minister for the Government of Japan, and Vice Chairman for Palo Alto Networks Japan. William began software programming in elementary school and started his own company while still in high school. Named Entrepreneur of the Year in 1998 (by Ernst & Young, NASDAQ and USA Today), he is recognized as one of the world’s leading authorities on cybersecurity. He is a Foundation Board Member at the World Economic Forum (WEF) and advises several national governments around the globe. His autobiography, An Unprogrammed Life: Adventures of an Incurable Entrepreneur, was published in 2011 by John Wiley & Sons.

Last year, CIO, CSO and PricewaterhouseCoopers released a new Global State of Information Security survey, which polled more than 10,000 executives from 127 countries about IT security. The results were a mixed bag, with security incidents up 38% over 2014 but corresponding budgets rising only 24%.
The survey reflected broad thinking about how companies are trying to defend themselves from hackers as well as employees, the most often cited sources of security compromises. But despite the continued growth in hacks and other security incidents, there were some important signs that security threats aren’t being taken seriously enough at the executive level. For one, the poll found that only 45% of boards participate in overall security strategy.
Brakes for your bullet train
This finding reflects common corporate psychology that cybersecurity is a cost center and a drain on resources – a Cisco survey of over 1,000 executives also found that 74% of respondents in the U.S. said that the main purpose of cybersecurity is to reduce risk instead of enable growth. I’ve found that people tend to think of cybersecurity as costly, complex, inefficient, and a damper on productivity. Many people believe it may not actually work or mitigate risk. This can result in security measures being implemented piecemeal without any overarching policy, resulting in costly but poor integration.
To make matters worse, by focusing on cost as a deciding factor for IT purchase decisions, companies will try to implement the bare minimum and, in some cases, also sacrifice usability and by extension, business productivity. Employees who aren’t confident in the tools and systems they are provided often turn to “shadow IT” – tools, many of which are cloud-based file sharing applications, that are not officially approved for use by the IT department.
This kind of mindset has engendered a defensive posture that’s not only inadequate when it comes to dealing with growing cyber threats like ransomware, but also short-changes the growth potential of business. Doing cybersecurity the right way is a must, and it has to be done at the highest levels of an organization because it affects the whole entity. But we can’t just think about it as a layer of protection. We have to think of cybersecurity as a plus, not a minus — a means of better using ICT to improve efficiency and productivity. This is true for companies as well as nations. To employ a Japanese example, the best way to think of cybersecurity is comparing it to the brakes on the famous Shinkansen bullet train. In 1964, they were heralded for their speed, but frankly anyone can make a fast train. It was the innovations in brakes that allowed the speed. The brakes aren’t there to act as a drag on the bullet train’s performance – they allow it to travel faster than conventional trains because they put the train drivers in control of its speed. To go really fast, you need really good brakes.

Only with VeilMail you can be CyberSafe!

No Email Addresses - VeilMail is a closed loop secure email system with no email addresses, eliminating the opportunity for outside party contact.
✔ No Addresses - no Spam.
✔ No Addresses - no sending messages to the wrong people.
✔ No Addresses - no returned mail.

No e-mail Server - VeilMail avoids using email servers improving security.
✔ Stand alone system
✔ No intervention

Abstract Security Layer - VeilMail runs on an AIC virtual machine (a proprietory development) which itself is an abstract security layer.

Encryption - VeilMail provides the strongest level of Encryption, one for data storage and another for communication.
✔ Uses 256 Bit AES by default and single use, random keys for all transmissions.

Unique functions in VeilMail sets it from all others
✔ The rights enforced on a message give the extra protection including restricting devices the user utilises to accessing/view the messages and data.
✔ Self destruct ensures messages do not linger in cyberspace.
✔ Message escalation enhances message intelligence.

No Local Storage - Messages are not stored locally on a user's machine, neither is it cached on servers outside your control.
✔ Backups of the user device not required
✔ Information available from any device if permitted

View Message on Selected Device - A user can select to view it's message on an assigned trusted device only.

Self Managed Nodes - There is no centralized database for storing data - each account manages it's own messages.

Completely Private - The administrator of the system cannot access/engage in private messages between any two users.

Contact the VeilMail team
Enquires to:
Help Desk: or (+64) 21 474 632
Physical Address: Unit A, Level 2, 33 Ponsonby Road, Ponsonby, Auckland, New Zealand

VeilMail in Afghanistan
Sales Representative in Afghanistan and Iran:

No comments: