As 2019—and the current decade—draw to a close, another city is being held for ransom.  The electronic ransom note is truly chilling as it indicates the hackers have “control of everything in your city.  We have comprised all passwords and sensitive data such as finance and personal population information.”

It is a stark reminder that all enterprises, whether they be governments, hospitals, universities or Fortune 2000 company, must up their game in data security and evolve their practices to stop being vulnerable to cybercrimes.

Networks with be flooded with more connected devices than ever before through IoT, providing a wealth of opportunity for hackers to compromise critical data.  Hackers are no longer lone wolves isolated from the target, but complex criminal organizations or foreign government defense departments using social engineering, rogue devices, or disgruntled employees with access to sensitive data.

In the coming decade, success stories will not revolve around analyzing data, but rather protecting it.  We know passwords are not adequate.  But neither is encryption.

Traditional data protection relies on encryption. Encrypted data appears “scrambled” to viewers attempting to access the data unless the user has the correct “key,” which opens the door and unscrambles the data. If scrambled data is intercepted and downloaded by a third party, the third party will be unable to read it. However, if a hacker has access to the encryption key, found on any of the connected devices, they will be able to read the data. Even worse, these data leaks can persist for months if devices are not flagged for accessing sensitive data irregularly or cannot be easily once discovered. Data encryption is not enough to protect data from attacks today and certainly won’t be enough to fight attacks tomorrow. Companies must not only protect the transfer of data between devices, they must protect the devices too.

Data encryption combined with endpoint management is the solution. Endpoints are devices connected to the network. This includes traditional devices such as laptops and cellphones, but with onset of smart IoT devices it is beginning to include the machine floor thermostat, the home refrigerator, and the office fish tank. Every device on a network is another opportunity to gain access and steal data.

To combat this growing threat, we offer the SPYRUS Enterprise Management System (SEMS) Platform. SEMS allows enterprises of all types to manage all endpoints on their network. Each endpoint has a log of data, tracking what data it attempts to access. These devices can be granted permissions or have permissions revoked remotely through SEMS, without devices being brought to the IT department. In addition, devices are flagged when attempting to access data inappropriately and can be remotely shut off or even destroyed through a “kill pill” if data is being compromised.

SPYRUS was recently named one of the “Top 10 Encryption Providers – 2019” by Enterprise Security Magazine for our SEMS platform.  You can read the interview here at

Our commitment to high assurance authentication encryption continues as we are soon to launch our 4th generation cryptographic operating system and working towards a post quantum solution that will implement the best next generation algorithms securely, efficiently and cost effectively.

I was recently interviewed for CybersecurityTV about our company’s approach to data security through marrying encryption and endpoint management. To learn more about how SPYRUS protects networks and hear some interesting use cases, watch the interview at