{"id":1756,"date":"2018-12-02T11:16:57","date_gmt":"2018-12-02T11:16:57","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1756"},"modified":"2019-05-30T17:24:32","modified_gmt":"2019-05-30T17:24:32","slug":"9-encryption-use-cases-when-you-should-use","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/","title":{"rendered":"9 Encryption Use Cases When You Should Use?"},"content":{"rendered":"\n<p><strong>Encryption <\/strong>may sound like a subject best left to hackers and criminal use, but don&#8217;t be a victim: It&#8217;s very critical part of every walks of life and something that&#8217;s important for everyone. Here you can learn about 9 encryption use cases which help you to decide whether your files need encryption or not.<\/p>\n\n\n\n<p>It\u2019s great that you\u2019re thinking about protecting your files, with all kinds of snoops out there (from big government to identity thieves). You\u2019re right, though\u2014you don\u2019t need to <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/do-i-really-need-to-encrypt-every-file-on-my-computer\/\">protect every single file <\/a>you store or send (especially the MP3s). Financial records are the obvious types of information you should protect, but there are many other kinds of files you should encrypt as well.<\/p>\n\n\n\n<p>The problem is that anything on your devices that is private or potentially sensitive. You may not save your bank statements and tax documents on your computer, but <strong>do you save your passwords in your browser? Do you stay logged into your email? Do you have access to anything work-related at all? <\/strong>That kind of stuff can lead thieves right into your life. Even if your user account has a password, it\u2019s trivial to get past that if your device isn\u2019t encrypted.<\/p>\n\n\n\n<p>If your device is <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">encrypted<\/a>, however, almost no one will be able to access the data within\u2013as long as you have a stronger passwords, two factor authentications, following good computer security policies and your device wasn\u2019t confiscated by anyone.&nbsp;<\/p>\n\n\n\n<p>So if you haven\u2019t done so, take some time today to encrypt all your devices\u2013<a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2mac.html\">your laptop<\/a>, <a href=\"http:\/\/www.kruptos2.co.uk\/android.html\">your phone, your tablet<\/a>, <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2go.html\">your USB stick<\/a> and anything else you may have. It\u2019s quick and easy, and you\u2019ll be much safer if the worst happens. You never think you\u2019ll need these things until it\u2019s too late.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"361\" height=\"240\" src=\"http:\/\/www.kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/sensitive.jpg\" alt=\"Kruptos encryption\" class=\"wp-image-1759\" srcset=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/sensitive.jpg 361w, https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/sensitive-300x199.jpg 300w\" sizes=\"auto, (max-width: 361px) 100vw, 361px\" \/><\/figure>\n\n\n\n<p><strong>Here are nine encryption use cases you can think about any file you\u2019re considering encrypting:\u00a0<\/strong><\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to automatically encrypt all files on my laptop\/PC.<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to encrypt all files in a specific folder on my laptop\/PC.<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to share highly sensitive documents online<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-share-your-data-with-clients-securely-using-kruptos-2-pro\/\">share critical data files <\/a>to a college\/client in other office over network<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to transparently encrypt and limit access to a particular network folder to the IT team.&nbsp;<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to copy my files to a <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/password-protect-your-usb-drive-in-two-easy-steps\/\">removable media device<\/a> for data backup<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to share my photos with my family members via cloud drives<\/p>\n\n\n\n<p>\u00a0\u25a0 I want to allow access to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\">encrypted devices only within my organization<\/a>.\u00a0<\/p>\n\n\n\n<p>&nbsp;\u25a0 I want to send an <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\">encrypted email attachment <\/a>to my partner and allow them to access the attachment without requiring them to install any software.<\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-kruptos-security-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"vNV0qpaT0H\"><a href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\">How to Protect Your Privacy on Your Devices<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;How to Protect Your Privacy on Your Devices&#8221; &#8212; Kruptos Security Blog\" src=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/embed\/#?secret=P2vQMcPfnH#?secret=vNV0qpaT0H\" data-secret=\"vNV0qpaT0H\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Encryption may sound like a subject best left to hackers and criminal use, but don&#8217;t be a victim: It&#8217;s very critical part of every walks of life and something that&#8217;s important for everyone. Here you can learn about 9 encryption use cases which help you to decide whether your files need encryption or not. It\u2019s &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\"> <span class=\"screen-reader-text\">9 Encryption Use Cases When You Should Use?<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":2,"featured_media":1757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,37],"tags":[],"class_list":["post-1756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-online-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>9 Encryption Use Cases When You Should Use? - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Learn about Encryption use cases with examples, Should I encrtpt all my files? Should I Use Encryption? Shall I encrypt my files before sharing?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9 Encryption Use Cases When You Should Use? - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn about Encryption use cases with examples, Should I encrtpt all my files? Should I Use Encryption? Shall I encrypt my files before sharing?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-02T11:16:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-30T17:24:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"360\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Candy Ross\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Candy Ross\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\"},\"author\":{\"name\":\"Candy Ross\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\"},\"headline\":\"9 Encryption Use Cases When You Should Use?\",\"datePublished\":\"2018-12-02T11:16:57+00:00\",\"dateModified\":\"2019-05-30T17:24:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\"},\"wordCount\":478,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg\",\"articleSection\":[\"Data Protection\",\"How To\",\"Online Safety\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\",\"name\":\"9 Encryption Use Cases When You Should Use? - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg\",\"datePublished\":\"2018-12-02T11:16:57+00:00\",\"dateModified\":\"2019-05-30T17:24:32+00:00\",\"description\":\"Learn about Encryption use cases with examples, Should I encrtpt all my files? Should I Use Encryption? Shall I encrypt my files before sharing?\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg\",\"width\":360,\"height\":240,\"caption\":\"encryption use cases\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"9 Encryption Use Cases When You Should Use?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\",\"name\":\"Candy Ross\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"caption\":\"Candy Ross\"},\"description\":\"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.\",\"sameAs\":[\"http:\/\/www.kruptos2.com\"],\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9 Encryption Use Cases When You Should Use? - Kruptos Security Blog","description":"Learn about Encryption use cases with examples, Should I encrtpt all my files? Should I Use Encryption? Shall I encrypt my files before sharing?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/","og_locale":"en_US","og_type":"article","og_title":"9 Encryption Use Cases When You Should Use? - Kruptos Security Blog","og_description":"Learn about Encryption use cases with examples, Should I encrtpt all my files? Should I Use Encryption? Shall I encrypt my files before sharing?","og_url":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/","og_site_name":"Kruptos Security Blog","article_published_time":"2018-12-02T11:16:57+00:00","article_modified_time":"2019-05-30T17:24:32+00:00","og_image":[{"width":360,"height":240,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg","type":"image\/jpeg"}],"author":"Candy Ross","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Candy Ross","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/"},"author":{"name":"Candy Ross","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb"},"headline":"9 Encryption Use Cases When You Should Use?","datePublished":"2018-12-02T11:16:57+00:00","dateModified":"2019-05-30T17:24:32+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/"},"wordCount":478,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg","articleSection":["Data Protection","How To","Online Safety"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/","url":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/","name":"9 Encryption Use Cases When You Should Use? - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg","datePublished":"2018-12-02T11:16:57+00:00","dateModified":"2019-05-30T17:24:32+00:00","description":"Learn about Encryption use cases with examples, Should I encrtpt all my files? Should I Use Encryption? Shall I encrypt my files before sharing?","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/ecryption-banner.jpg","width":360,"height":240,"caption":"encryption use cases"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"9 Encryption Use Cases When You Should Use?"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb","name":"Candy Ross","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","caption":"Candy Ross"},"description":"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.","sameAs":["http:\/\/www.kruptos2.com"],"url":"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1756"}],"version-history":[{"count":11,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1756\/revisions"}],"predecessor-version":[{"id":1955,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1756\/revisions\/1955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1757"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}