Last year, I wrote about Six Management Lessons That IT Leaders Can Learn From Darth Vader and with the looming release of Star Wars: Rogue One, it is time to revisit the Star Wars universe. Rogue One focuses on the theft of the Death Star plans, and in this blog post, I wanted to explore five things that we can learn from the Empire’s lax security practices.
In the opening sequence of Star Wars, we see Princess Leia inserting the Death Star plans into R2-D2. The droid seemingly had no issues reading the data and later projecting 3D holograms of the information. Unless R2 has some super-secret and highly advanced decryption capability, it would appear that the Death Star plans were not encrypted. Hmmm, really? These plans are for the most sophisticated battle station in the universe and the Empire forgets encryption?
Strong encryption limits access to critical data to those who have the encryption key. This technology adds a layer of security because Rebel scum can only read the data if they have both the source files and the encryption key. Thus the hacker needs to capture two pieces of data to gain access to private information. A natural offshoot of this process is that key management is critical and that the most effective security strategies include both strong encryption and highly secure key management. In a stunning turn of events, the Empire overlooked both of these strategies.
At Dell EMC, we offer a variety of encryption options including solutions for data at rest and in flight. (more…)