{"id":4681,"date":"2021-10-12T12:50:15","date_gmt":"2021-10-12T10:50:15","guid":{"rendered":"https:\/\/www.digitronic.net\/?p=4681"},"modified":"2022-02-25T14:22:17","modified_gmt":"2022-02-25T13:22:17","slug":"encryption-as-a-central-component-of-it-security","status":"publish","type":"post","link":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/","title":{"rendered":"Encryption as a central component of IT security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=&#8221;3100&#8243; el_class=&#8221;nur_im_raster&#8221;][vc_column_text el_class=&#8221;datum&#8221;]Chemnitz, 20.07.2021[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"aligncenter wp-image-4269 size-full\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/Verschl\u00fcsselung_Tresor_breit.jpg\" alt=\"Bild Verschl\u00fcsselung als zentraler Bestandteil der IT-Security\" width=\"1000\" height=\"417\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/Verschl\u00fcsselung_Tresor_breit.jpg 1000w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/Verschl\u00fcsselung_Tresor_breit-300x125.jpg 300w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/Verschl\u00fcsselung_Tresor_breit-768x320.jpg 768w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/p>\n<p>Reliable data encryption is more important today than ever before. Especially when teams have to work on highly confidential data in a decentralized manner or across national borders. The increasing outsourcing of work to the home office also makes a rethink of the security structure in companies quite sensible.<\/p>\n<p>In the following, we will look at what is actually meant by confidential data, why simple password protection for confidential files and folders is not enough, what the disadvantages of data encryption with Windows on-board tools are, and what alternatives there are to Windows tools.<\/p>\n<h2>What is confidential data anyway?<\/h2>\n<p>Basically, confidential data is any information that requires special protection and should not fall into the wrong hands. Here it is important for companies to consider two main aspects: The legal and the economic aspect. From a legal perspective, since the enforcement of the General Data Protection Regulation (GDPR), all personal data is particularly worthy of protection. This means that all employee and customer data must be protected from misuse by law, otherwise there is a risk of high financial penalties.<\/p>\n<p>In purely economic terms, however, there is a great deal of other data that requires special protection because it secures a competitive advantage for the company or contains sensitive company internals, such as:<\/p>\n<ul>\n<li>Research and development data<br \/>\n<img decoding=\"async\" class=\"size-medium wp-image-4235 alignright\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg\" alt=\"Grafik Hackerangriff\" width=\"300\" height=\"298\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg 300w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-150x150.jpg 150w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff.jpg 536w\" sizes=\"(max-width: 300px) 85vw, 300px\" \/><\/li>\n<li>Prototype data<\/li>\n<li>construction plans<\/li>\n<li>strategic documents<\/li>\n<li>Project data<\/li>\n<li>Calculations<\/li>\n<li>transaction data<\/li>\n<li>protocols<\/li>\n<li>memos<\/li>\n<li>and much more<\/li>\n<\/ul>\n<p>If confidential information is not adequately protected, in the worst case scenario it can be tapped by hackers &#8211; or just as bad, by unauthorized people internally &#8211; and fall into the wrong hands.<\/p>\n<h2>Password protection for files and folders not secure enough and there is a risk of data loss<\/h2>\n<p><a href=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/arbeitsmappe-sch\u00fctzen.jpg\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignright wp-image-4239 size-medium\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/arbeitsmappe-sch\u00fctzen-300x259.jpg\" alt=\"Screenshot Arbeitsmappe sch\u00fctzen Windows\" width=\"300\" height=\"259\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/arbeitsmappe-sch\u00fctzen-300x259.jpg 300w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/arbeitsmappe-sch\u00fctzen.jpg 550w\" sizes=\"(max-width: 300px) 85vw, 300px\" \/><\/a>In some companies, confidential information is therefore at least password protected. In the individual Windows applications, this option is usually found under the menu item &#8220;File&#8221; -&gt; &#8220;Information&#8221; -&gt; &#8220;Protect workbook \/ document&#8221;. However, this protection is very insecure, not very practical and if used incorrectly, there is a risk of data loss, because:<\/p>\n<ul>\n<li>Mostly all documents are protected with one and the same password<\/li>\n<li>If the password is too simple, it can be easily hacked<\/li>\n<li>If the password is too complicated, it can be quickly forgotten and you can no longer open the file<\/li>\n<\/ul>\n<h2>Data encryption with Windows on-board tools not consistent enough<\/h2>\n<p>Windows therefore brings yet another way to protect sensitive<br \/>\n<a href=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/verschl\u00fcsseln-windows-boardmitteln.jpg\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignright wp-image-4241 size-medium\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/verschl\u00fcsseln-windows-boardmitteln-297x300.jpg\" alt=\"Screenshot Verschl\u00fcsseln mit Windows-Boardmitteln\" width=\"297\" height=\"300\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/verschl\u00fcsseln-windows-boardmitteln-297x300.jpg 297w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/verschl\u00fcsseln-windows-boardmitteln.jpg 485w\" sizes=\"(max-width: 297px) 85vw, 297px\" \/><\/a>information from unauthorized access:<\/p>\n<p>By right-clicking on the corresponding file\/folder, you can access the &#8220;Attributes&#8221; area in the &#8220;General&#8221; tab via the properties and select the desired compression and encryption attributes there by clicking on the &#8220;Advanced&#8221; button.<\/p>\n<p>Unfortunately, however, even this variant of data encryption is not consistent enough and bears the risk of data loss, because:<\/p>\n<ul>\n<li>The generated key is attached to the account ID of your Windows user account, i.e. the file is encrypted only if you open it from another user account<\/li>\n<li>If a hacker (or an unauthorized employee) logs in with your user account, he sees the file in plain text<\/li>\n<li>When deleting the user account, the access to the protected files is irrevocably lost, if you have not exported the certificate first<\/li>\n<\/ul>\n<h2>Additional tool for the production of confidentiality<\/h2>\n<p>That&#8217;s why you can&#8217;t avoid using additional tools to adequately protect sensitive information. With the HiCrypt\u2122 encryption solution, for example, you can ensure that only a selected group of people has access to certain data &#8211; and that is decoupled from the Windows user profiles. In doing so, HiCrypt\u2122 fully integrates with your familiar Explorer view and runs as an additional network drive alongside your existing ones. By storing data in the HiCrypt\u2122 network drive, the data is automatically encrypted. Access to the protected files is possible from anywhere and in a team. Authorization to view file contents is individually configurable and centrally manageable. Absolutely unique is the clear separation of powers in HiCrypt\u2122 through decoupled access rights. This means that administrators can prepare the drives for encryption, but have no authorization to view the data. This protects them in case of suspicion.<\/p>\n<figure id=\"attachment_4104\" aria-describedby=\"caption-attachment-4104\" style=\"width: 840px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-4104 size-large\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/05\/Grafik_Funktionsweise_HiCrypt-1-1024x310.png\" alt=\"Grafik Funktionsweise HiCrypt\" width=\"840\" height=\"254\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/05\/Grafik_Funktionsweise_HiCrypt-1-1024x310.png 1024w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/05\/Grafik_Funktionsweise_HiCrypt-1-300x91.png 300w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/05\/Grafik_Funktionsweise_HiCrypt-1-768x232.png 768w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/05\/Grafik_Funktionsweise_HiCrypt-1-1200x363.png 1200w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/05\/Grafik_Funktionsweise_HiCrypt-1.png 1280w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption id=\"caption-attachment-4104\" class=\"wp-caption-text\">Funktionsweise HiCrypt\u2122<\/figcaption><\/figure>\n<p>The software is installed in just a few minutes and runs silently in the background.\u00a0HiCrypt\u2122 is available in the versions &#8220;Professional&#8221; and &#8220;Enterprise Services&#8221;. Try HiCrypt\u2122 Professional conveniently for 30 days free of charge or download the fact sheet with further technical information.[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/12&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;5\/12&#8243;][vc_column_text el_class=&#8221;download_button&#8221;]<\/p>\n<p style=\"text-align: center;\"><a href=\"\/en\/encryption\/#info\" target=\"_blank\" rel=\"noopener\">Test now for 30 days<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;5\/12&#8243;][vc_column_text el_class=&#8221;invert_button&#8221;]<\/p>\n<p style=\"text-align: center;\"><a href=\"\/files\/Fact-Sheet-HiCrypt_ENG.pdf\" target=\"_blank\" rel=\"noopener\">Facts &amp; Features<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cccccc&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>These articles may interest you:<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<div class=\"posts\"><div class=\"post drittel\"><a href=\"https:\/\/www.digitronic.net\/en\/acl-neuer-kooperationspartner\/\" class=\"\" target=\"_blank\"><div class=\"gruen_drueber\"><div class=\"turnaround\"><div class=\"front\"><img decoding=\"async\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2023\/08\/Vorschaubild-ACL.jpg\" class=\"thumb\" alt=\"\"><div class=\"gruene_ecke\"><\/div><\/div><div class=\"back\">Erfahren Sie, weshalb SmartLogon\u2122 jetzt auch wie ein Lichtschalter im Treppenhaus funktioniert und was ACL damit zu tun hat.<\/div><\/div><\/div><div class=\"gruen_drunter\"><div class=\"date\">08.06.2023<\/div><div class=\"title\">ACL becomes digitronic cooperation-partner<\/div><\/div><\/a><\/div><div class=\"post drittel\"><a href=\"https:\/\/www.digitronic.net\/en\/zuwachs-in-der-entwicklung\/\" class=\"\" target=\"_blank\"><div class=\"gruen_drueber\"><div class=\"turnaround\"><div class=\"front\"><img decoding=\"async\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2024\/03\/MicrosoftTeams-image-33.jpg\" class=\"thumb\" alt=\"\"><div class=\"gruene_ecke\"><\/div><\/div><div class=\"back\">Anfang Februar begr\u00fc\u00dft digitronic zwei neue Mitarbeiterinnen in der Entwicklung.<\/div><\/div><\/div><div class=\"gruen_drunter\"><div class=\"date\">01.02.2024<\/div><div class=\"title\">digitronic gains new members in development<\/div><\/div><\/a><\/div><div class=\"post drittel\"><a href=\"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/\" class=\"\" target=\"_blank\"><div class=\"gruen_drueber\"><div class=\"turnaround\"><div class=\"front\"><img decoding=\"async\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2020\/09\/verschwundener_tresor.jpg\" class=\"thumb\" alt=\"\"><div class=\"gruene_ecke\"><\/div><\/div><div class=\"back\">All too often, the topic of encryption of sensitive data in companies is not or not sufficiently highlighted. Yet data encryption is an important component for establishing confidentiality and the...<\/div><\/div><\/div><div class=\"gruen_drunter\"><div class=\"date\">20.07.2021<\/div><div class=\"title\">Encryption as a central component of IT security<\/div><\/div><\/a><\/div><\/div>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>All too often, the topic of encryption of sensitive data in companies is not or not sufficiently highlighted. Yet data encryption is an important component for establishing confidentiality and the common Windows tools are usually not sufficient to establish adequate protection.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-4681","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Encryption as a central component of IT security - digitronic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption as a central component of IT security - digitronic\" \/>\n<meta property=\"og:description\" content=\"All too often, the topic of encryption of sensitive data in companies is not or not sufficiently highlighted. Yet data encryption is an important component for establishing confidentiality and the common Windows tools are usually not sufficient to establish adequate protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"digitronic\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-12T10:50:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-25T13:22:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg\" \/>\n<meta name=\"author\" content=\"digitronic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"digitronic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/\"},\"author\":{\"name\":\"digitronic\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#\\\/schema\\\/person\\\/ea10270a5e842e90ef3f94ba7fcb899c\"},\"headline\":\"Encryption as a central component of IT security\",\"datePublished\":\"2021-10-12T10:50:15+00:00\",\"dateModified\":\"2022-02-25T13:22:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/\"},\"wordCount\":888,\"image\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/07\\\/hackerangriff-300x298.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/\",\"name\":\"Encryption as a central component of IT security - digitronic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/07\\\/hackerangriff-300x298.jpg\",\"datePublished\":\"2021-10-12T10:50:15+00:00\",\"dateModified\":\"2022-02-25T13:22:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#\\\/schema\\\/person\\\/ea10270a5e842e90ef3f94ba7fcb899c\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/07\\\/hackerangriff-300x298.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/07\\\/hackerangriff-300x298.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption-as-a-central-component-of-it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption as a central component of IT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#website\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/\",\"name\":\"digitronic\",\"description\":\"Spezialist f\u00fcr Datensicherheit und 2-Faktor-Authentifzierung\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitronic.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#\\\/schema\\\/person\\\/ea10270a5e842e90ef3f94ba7fcb899c\",\"name\":\"digitronic\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/author\\\/digitronic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryption as a central component of IT security - digitronic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Encryption as a central component of IT security - digitronic","og_description":"All too often, the topic of encryption of sensitive data in companies is not or not sufficiently highlighted. Yet data encryption is an important component for establishing confidentiality and the common Windows tools are usually not sufficient to establish adequate protection.","og_url":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/","og_site_name":"digitronic","article_published_time":"2021-10-12T10:50:15+00:00","article_modified_time":"2022-02-25T13:22:17+00:00","og_image":[{"url":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg","type":"","width":"","height":""}],"author":"digitronic","twitter_card":"summary_large_image","twitter_misc":{"Written by":"digitronic","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#article","isPartOf":{"@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/"},"author":{"name":"digitronic","@id":"https:\/\/www.digitronic.net\/#\/schema\/person\/ea10270a5e842e90ef3f94ba7fcb899c"},"headline":"Encryption as a central component of IT security","datePublished":"2021-10-12T10:50:15+00:00","dateModified":"2022-02-25T13:22:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/"},"wordCount":888,"image":{"@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/","url":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/","name":"Encryption as a central component of IT security - digitronic","isPartOf":{"@id":"https:\/\/www.digitronic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg","datePublished":"2021-10-12T10:50:15+00:00","dateModified":"2022-02-25T13:22:17+00:00","author":{"@id":"https:\/\/www.digitronic.net\/#\/schema\/person\/ea10270a5e842e90ef3f94ba7fcb899c"},"breadcrumb":{"@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#primaryimage","url":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg","contentUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/07\/hackerangriff-300x298.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.digitronic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Encryption as a central component of IT security"}]},{"@type":"WebSite","@id":"https:\/\/www.digitronic.net\/#website","url":"https:\/\/www.digitronic.net\/","name":"digitronic","description":"Spezialist f\u00fcr Datensicherheit und 2-Faktor-Authentifzierung","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitronic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.digitronic.net\/#\/schema\/person\/ea10270a5e842e90ef3f94ba7fcb899c","name":"digitronic","url":"https:\/\/www.digitronic.net\/en\/author\/digitronic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/posts\/4681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/comments?post=4681"}],"version-history":[{"count":0,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/posts\/4681\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/media?parent=4681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/categories?post=4681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/tags?post=4681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}