Pub. 8 2013-2014 Issue 2

July | August 2013 19 Extraordinary Service for Extraordinary Members. information secure is to maintain control yourself, i.e., don’t put it in the cloud. However, here are some tools that may improve security: • Zip up documents and use the built-in encryption capability. • Windows-based SecretSync can be used to encrypt local files before sending them to Dropbox. • TrueCrypt is freeware that can be used to create an en- crypted container. • BoxCryptor has 256-bit AES encryption and can be used to encrypt individual files. • Encryption keys should be at least 15 characters long. Of course, using encryption to protect sensitive informa- tion in Dropboxmeans that everyone who needs to access the information will need to enter an encryption key. A 15-char- acter encryption key will likely be written down somewhere and the key will need to be shared with everyone, so the loss of the encryption key starts to become an issue—not to mention that the ease of usage and advantages of easy access with the iPad are all lost to good security practices. It may be easier, and less risky, to keep sensitive information out of the cloud altogether.  Uncompromising Quality. Baird Holm represents nancial institutions and bank holding companies, in all aspects of banking and lending law. To learn more about our practice, please visit our website at www.bairdholm.com . 1500 Woodmen Tower Omaha, NE 68102 www.bairdholm.com 402.344.0500 Jonathan J. Wegner “Their legal guidance is practical, efcient, and positively delivered.” Chambers USA For more information, contact Denise Mainquist, CISA, CPHIT at ITPAC Consulting at 402-420-1556 or dmainquist@itpac.biz. ITPAC Consulting provides independent IT audits and information security consulting for community banks. In 2013, Lincoln, Neb.-based ITPAC is celebrating four years of providing exceptional value to its clients.

RkJQdWJsaXNoZXIy OTM0Njg2