{"id":83,"date":"2019-12-30T12:24:04","date_gmt":"2019-12-30T12:24:04","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=83"},"modified":"2020-02-05T08:33:40","modified_gmt":"2020-02-05T08:33:40","slug":"forming-your-encryption-strategy","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/forming-your-encryption-strategy\/","title":{"rendered":"Forming your encryption strategy"},"content":{"rendered":"\n<p>It\u2019s time to start thinking about encryption techniques that may be used to protect data. <\/p>\n\n\n\n<p>At the highest level, you\u2019ll need to think about \u2018Data at Rest\u2019 and \u2018Data in Motion\u2019. <\/p>\n\n\n\n<p>Data in Motion specifically covers how you protect data as it moves between systems and platforms, while Data at Rest covers how information is retrieved and stored, securely, by users, applications and databases. <\/p>\n\n\n\n<p>Protection of data in motion or at rest requires the use of encryption techniques, and there are many methods that can be used. However, all encryption has the same fundamental underlying need, and that is an encryption key. These keys are used to encode the data in such a way that without the same, or corresponding key, the data is rendered useless.  <a href=\"https:\/\/go.thalesesecurity.com\/rs\/480-LWA-970\/images\/2019-Enterprise-Encryption-Blueprint-wp.pdf?aliId=eyJpIjoiNXVoK1JIZ09vTmlYR25GTiIsInQiOiJEbHF6b3ZOdFhyakU4bk1idzhNQmtBPT0ifQ%253D%253D\">Read more<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed  solutions to automated, manage threat intelligence, forensic  investigations and cyber security training. Our objective is to support  organisations and consumers at every step of their cyber maturity  journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>   <\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s time to start thinking about encryption techniques that may be used to protect data. At the highest level, you\u2019ll need to think about \u2018Data at Rest\u2019 and \u2018Data in Motion\u2019. Data in Motion specifically covers how you protect data as it moves between systems and platforms, while Data at Rest covers how information is &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/forming-your-encryption-strategy\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Forming your encryption strategy&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[8],"tags":[],"class_list":["post-83","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/83\/revisions"}],"predecessor-version":[{"id":173,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/83\/revisions\/173"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=83"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=83"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}