May 4, 2024
Over the past few months, we’ve been exploring different ways to apply encryption to secure confidential business data in a midsized business. We’ve looked at the basics of how encryption works and covered the application of encryption to data in transit both by electronic mail and over the Web using HTTPS. Now, we turn our attention to securing data at rest: using encryption to protect it from the prying eyes of thieves who gain physical access to the devices that store it.
Read the full article: Three portable data storage encryption methods
Published in SearchMidmarketSecurity on 04/05/10
Leave a Reply