Information Security Leader, Author, Instructor and Speaker

Three portable data storage encryption methods

Posted on April 5, 2010 in Articles | by

Over the past few months, we’ve been exploring different ways to apply encryption to secure confidential business data in a midsized business. We’ve looked at the basics of how encryption works and covered the application of encryption to data in transit both by electronic mail and over the Web using HTTPS. Now, we turn our attention to securing data at rest: using encryption to protect it from the prying eyes of thieves who gain physical access to the devices that store it.

Read the full article: Three portable data storage encryption methods

Published in SearchMidmarketSecurity on 04/05/10

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *