itSynergy: Blog

Encryption 101: How to Protect Sensitive Data

Encryption 101: How to Protect Sensitive Data

Free July 12 “Hacking the Human” webinar to share tips for building a strong cyber defense wall and address state’s new data breach notification law

PHOENIX, Ariz. (July 3, 2018) – With more data breaches being reported every day, it’s hard to ignore the fact that businesses must be proactive in protecting sensitive data. An important layer in your cyber defense strategy is to encrypt data relating to personally identifiable information, financial reports, research and development, new product plans and more.

“Encryption is the process of scrambling data so that only the people you authorize can decipher it,” said Michael Cocanower, president and CEO of Phoenix-based itSynergy. “Think of it like a Post Office mailbox. Anyone can put a letter in the mailbox, but only the postal worker can open the door to retrieve, or decipher, the information that was deposited.”

Cocanower, a cybersecurity expert and certified ethical hacker who has been recognized nationally and locally for his IT expertise, will conduct a free, 15-minute “Encryption 101” webinar on Thursday, July 12 at 11:30 a.m. Geared towards non-technical end users in business at any level, the webinar will include tips for protecting sensitive data through encryption and address Arizona’s new data breach notification law. Interested participants can register at:

“Arizona’s new law only applies to compromised data that is not encrypted. The good news is that utilizing encryption technology has become much easier than it used to be. All businesses should take an inventory of the personally identifiable information they store and assess whether that information can be stored in encrypted form or not. If it can, then even if you are breached, the notification requirements will not trigger if the stolen data was encrypted,” Cocanower said.

With more employees storing data on their phones, laptops, home computers and in the cloud, sneaky thieves have more entry points to access sensitive data. A recent survey by Sophos found that while 84 percent of companies said they are concerned about data security in the cloud, only 39 percent reported that they encrypt all files stored in the cloud. Another 47 percent said they encrypt some files stored in the cloud, while 11 percent said they don’t encrypt any files in the cloud but plan to.

Another big issue: many businesses don’t extend the same level of protection to their employees as they do to their customers. The Sophos survey of 1,700 global business executives who handle IT decision-making revealed that employee bank details are encrypted by 69 percent of companies that store that type of data. Of the U.S. companies surveyed that do use encryption, only 79 percent claim to always secure employee bank details.

The global survey also found that 43 percent of the companies holding sensitive employee human resources files don’t always encrypt them, and 47 percent of those that store employee healthcare information fail to consistently encrypt these records.

“Encrypting sensitive data makes a lot of sense, particularly in light of Arizona’s new data breach notification law, which only triggers if personally identifiable data is not encrypted. Considering the hefty fines businesses can face if they are not compliant, it’s worth bringing on an IT partner to help your firm navigate the complexities involved with this new law,” Cocanower said.

The “Hacking the Human” webinars take place at 11:30 a.m. on the second Thursday of each month. Each webinar provides useful tips to ward off cyberattacks and more complex social engineering schemes that result in theft and corporate espionage.

For more information, call itSynergy at (602) 297-2400 or visit


About Michael Cocanower, President and CEO of itSynergy

He has his black belt in the Kung Sul division of Hwa Rang Do, a Korean martial art, so it’s fitting that Michael Cocanower’s passion is helping small and medium-sized businesses defend themselves against malicious cyber intruders. A Phoenix native, Cocanower founded itSynergy in 1997, and under his leadership, the company has experienced exponential revenue growth. A long-standing Microsoft Partner, itSynergy provides strategic technology management services for small and mid-sized organizations on a fixed monthly fee. Cocanower, who holds a Certified Ethical Hacker certification from the EC-Council, has received numerous awards and widespread industry recognition throughout his career, including being named one of 20/20 Visionaries in Channel Pro Network magazine’s May 2016 issue. The magazine regularly turns to him for input on current IT trends, and called him a “shrewd and articulate observer of the SMB market.” In addition, the Arizona chapter of Entrepreneurs’ Organization (EO) recently appointed Cocanower to the board of directors as forum chair after serving two years as membership chair.

Media Contact:

Sue Kern-Fleischer, PublicizeThis!, (602) 810-1404,



itSynergy has been providing managed IT services and outsourced technology management to small- and mid-sized businesses for over 20 years. We are seen as trusted technology advisors by clients because we partner with them for success. Our philosophy is that when technology works as it should, it supports and enhances an organization’s ability to accomplish its goals and objectives and meet business growth goals.