Encryption assistance

How does encryption protect information?

Information stored or transmitted in an unencrypted form can easily be read by an attacker or thief. When that same information is encrypted using a key, only the person with access to the correct key will be able to decrypt the information.

The two methods of encryption

Encryption secures information in one of two situations:

  1. While it is being stored, referred to as “encrypting data at rest”
  2. While it is being transmitted, referred to as “encrypting data in transit”

There are different tools for each of these two uses. If you store and/or transmit critical information, you must encrypt the information.

See the following resources or consult with your IT Professional to ensure you are encrypting information appropriately.

For information on encrypting stored critical information, see:

For information on encrypting transmitted critical information, see: