How to use Encryption Privacy Tools to Evade Corporate Espionage

Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close
, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation
phase and have engaged directly into full confrontation in the cyberwar. State-sponsored hacking groups are regularly committing targeted and complex attacks against governments, businesses, and individuals.

PDF FILE: http://icitech.org/wp-content/uploads/2015/08/ICIT-Brief-Encryption-Priv...