VirtualTeams_Toolkit_ENG

53 www.virtual-teams.eu 6.2. Best practices for content encryption Put simply, data encryption is a process that changes data from its original format into a new format. To translate it back, you typically need a special encryption key or code. An algorithm is the name given to the process of encrypting and decrypting data. Several different encryption algorithms have been widely utilized in recent decades and are widely available to all. Keep your encryption key secure: This should be exceedingly obvious, but it can be easy to make mistakes that allow unauthorized parties to access your data. If you leave your encryption key in an unencrypted file on your PC, there is a good chance that someone could find it and cause harm. It’s important that you rotate the location of your keys on a schedule. Encrypt all sensitive data: No matter how unlikely you think someone is to find the data it’s still important to encrypt it. Lots of big-name companies have been breached simply because they left important data unencrypted and someone gained access to it. Assess Encryption performance: If the process of encrypting your data is taking too long or consuming too much CPU time and memory you should consider switching to a different algorithm or experimenting with the settings of your encryption tools. The CPU (Central Process Unit) is essentially the brain of the computer. It is constantly following instructions of computer programs that tell it which data to process and how to process it. Without a CPU, we could not run programs on a computer. The stronger the CPU the quicker your computer can perform tasks.

RkJQdWJsaXNoZXIy NzYwNDE=