Forming your encryption strategy

It’s time to start thinking about encryption techniques that may be used to protect data.

At the highest level, you’ll need to think about ‘Data at Rest’ and ‘Data in Motion’.

Data in Motion specifically covers how you protect data as it moves between systems and platforms, while Data at Rest covers how information is retrieved and stored, securely, by users, applications and databases.

Protection of data in motion or at rest requires the use of encryption techniques, and there are many methods that can be used. However, all encryption has the same fundamental underlying need, and that is an encryption key. These keys are used to encode the data in such a way that without the same, or corresponding key, the data is rendered useless. Read more

iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us

Leave a Reply

Your email address will not be published. Required fields are marked *