{"id":1981,"date":"2019-03-22T16:51:38","date_gmt":"2019-03-22T16:51:38","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1981"},"modified":"2019-05-31T17:23:16","modified_gmt":"2019-05-31T17:23:16","slug":"top-reasons-encryption-is-not-used","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/","title":{"rendered":"Top Reasons Encryption Is Not Used"},"content":{"rendered":"<p class=\"p3\">There is many reasons to <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/usb-security\/\">password-protect \u2013 or encrypt<\/a> \u2013 one&#8217;s digital data and keep private life as private. Foremost among them is to protect it during a security breach. This article list down top reasons encryption is not used by individuals as well organisations.<\/p>\n<h3 class=\"p3\"><b>Top Reason <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\">why we encrypt<\/a><\/b><\/h3>\n<p class=\"p3\">Here is what <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bruce_Schneier\">Bruce Schneier<\/a> says about why we should encrypt, Schneier is the creator of many cryptographic algorithms includes <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/commonly-used-encryption-algorithms\/\">Blowfish and Twofish<\/a>.<\/p>\n<blockquote><p>\u00a0\u201cEncryption protects our data. It protects our data when it&#8217;s sitting on our computers and in data centers, and it protects it when it&#8217;s being transmitted around the Internet. It protects our conversations, whether video, voice, or text. It protects our privacy. It protects our anonymity. And sometimes, it protects our lives.<\/p>\n<p class=\"p3\">This protection is important for everyone. It&#8217;s easy to see how encryption protects journalists, human rights defenders, and political activists in authoritarian countries. But encryption protects the rest of us as well. It protects our data from criminals. It protects it from competitors, neighbors, and family members. It protects it from malicious attackers, and it protects it from accidents.\u201d<\/p>\n<\/blockquote>\n<h3 class=\"p6\"><b>Top Reasons Encryption Is Not Used by Individuals<\/b><\/h3>\n<p class=\"p6\">There are many reasons not to encrypt, too. Here are top reasons encryption is not used by individuals,<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">A faulty storage device with encrypted data may render that data irretrievable, whereas non-encrypted there are easy to use tools that can potentially recover the information.<\/li>\n<li class=\"li3\">It takes time to set up on a device.<\/li>\n<li class=\"li3\">It is often not possible to remove encryption.<\/li>\n<li class=\"li3\">Wrong Assumption that Anti-virus tool will protect the data as well<\/li>\n<li class=\"li3\">It can make it more difficult for others to assist you with your device.<\/li>\n<li class=\"li3\">It can make transferring information to new hardware more difficult.<\/li>\n<li class=\"li3\">For some devices, requires a secondary login process like two-factor authentication.<\/li>\n<li class=\"li3\">It adds another layer of complexity when making changes to the device.<\/li>\n<li class=\"li3\">Simply don\u2019t want to pay for encryption software unless they absolutely are required protect sensitive data.<\/li>\n<\/ul>\n<p class=\"p6\">At the end of the day &#8211; the importance of encrypting a device should be seen in the same light as having a door to your home that only allows someone with the key to go through, but the door can never be unlocked. That sounds great, especially if you have some really valuable stuff inside, encryption makes sure to <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">keep your private life, private<\/a>.<\/p>\n<p class=\"p6\">An <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2go.html\">encrypted device<\/a> is far more secure than an unencrypted one. That means your data is going to be safe, should you lose your device.<\/p>\n<h3 class=\"p6\"><b>Top Reasons Encryption Is Not Used in SMBs<\/b><\/h3>\n<p class=\"p8\">The recent data breach of 9 million patient records in a healthcare organizations raises an important question \u201cWhat are the barriers that stop healthcare organizations from encrypting their devices?\u201d<span class=\"Apple-converted-space\">\u00a0 <\/span>One of the resulting\u00a0<a href=\"http:\/\/www.healthcareinfosecurity.com\/advocate-medical-breach-no-encryption-a-6021\/op-1\"><span class=\"s2\">stories, by Marianne McGee, has been posted at HealthCareInfosecurity<\/span><\/a>. \u00a0Here are the top common reasons why encryption is not implemented.<\/p>\n<h4 class=\"p8\"><b>Lack of executive support<\/b><\/h4>\n<p class=\"p3\">This has been a problem since SMBs and organizations started using encryption. Decision-makers and executives withhold their support for encryption for a wide range of reasons.<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">A large portion of executives don\u2019t want their data encrypted because they view encryption as being too complicated to use.<\/li>\n<li class=\"li3\">Many think encryption will slow them, and\/or their systems, down too much. Some think encryption now is as kludgy as it was 5, 10, 15 or even twenty years ago, when they first encountered using encryption and had very bad experiences. Those bad times with security technologies stick with them much longer than the good times.<\/li>\n<li class=\"li3\">Many executives think they already have the encryption they need if they are using SSL on their web sites. They simply don\u2019t understand that such encryption does not keep the data encrypted after it goes into the vast number of storage locations.<\/li>\n<li class=\"li3\">And many execs simply don\u2019t want to pay for encryption unless they absolutely are required to implement it.<\/li>\n<\/ul>\n<h4 class=\"p3\"><b>Lack of resources\/funding<\/b><\/h4>\n<p class=\"p3\">Encryption costs money. Not nearly as much as it did even just a few years ago, but generally, there will be a cost associated with implementing encryption everywhere you truly need it. SMBs and Organizations need to address this by figuring out why the funding isn\u2019t there. Here are some common reasons:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">The last bullet from section 1 above is one of the primary reasons why there is no funding. The execs and directors simply don\u2019t understand the importance, and so they put the kibosh on any funds.<\/li>\n<li class=\"li3\">I\u2019ve also seen budget proposals that simply did not include encryption as an oversight. It really is amazing how often it gets forgotten, while trying to include firewalls, DLP, anti-malware, etc. Encryption gets the short end of the stick almost as often (well, closer to than the others mentioned) training and awareness.<\/li>\n<li class=\"li3\">I\u2019ve seen many companies that originally had budgeted for encryption, but then many times that funding gets usurped by some other new project that is sexier and more glitzy. Yes, encryption is far too often the jilted technology spouse, left for a more exciting new technology, often not even related to security protection. Oh, Big Data Analytics, you are an extremely tempting option for many!<\/li>\n<\/ul>\n<h4 class=\"p8\"><b>\u00a0Increasing technology complexity, BYOD and mobility<\/b><\/h4>\n<p class=\"p3\">Think about all the complexity that exists within most SMBs and organizations. Web servers, file servers, desktop computers, smartphones and a wide range of other mobile computing devices, mobile storage devices, employee-owned devices used for business activities, stationary data storage, cloud services providing a wide range of services, and the list could go on.<\/p>\n<p class=\"p3\">Where is all the data? Where are all the risks to data?<span class=\"Apple-converted-space\">\u00a0 <\/span>This complexity often results in a hit-or-miss implementation of encryption. \u00a0There\u00a0are often problems with compatibility of encryption solutions with all these diverse computing devices. Sometimes there is no encryption solution for certain types of devices.<\/p>\n<p class=\"p3\">\u00a0It is not surprising that <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\">all the sensitive data<\/a> is not encrypted everywhere there are risks. However, that is not a good excuse for not being more proactive in identifying and managing risks.<\/p>\n<h3 class=\"p3\"><b>Final Thoughts<\/b><\/h3>\n<p class=\"p3\">Encryption is an effective tool that individuals as well all types of organizations, of all sizes in all industries, can use to help <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/2-ways-to-keep-your-sensitive-files-safe\/\">protect sensitive information<\/a> such as PHI and all other types of personal information.<\/p>\n<p class=\"p3\">To determine where to use it, first identify where your sensitive data is collected, stored and processed, and then identify the risks through the entire lifecycle of the sensitive data.<\/p>\n<p class=\"p3\">Implement encryption, in transit and in storage, in all the locations where there are sufficient levels of risk and legal compliance requirements to do so, to justify encryption to your business leaders and decision makers.<\/p>\n<p>You may also interested to know about <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/common-usage-of-encryption\/\">common usage of encryption<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is many reasons to password-protect \u2013 or encrypt \u2013 one&#8217;s digital data and keep private life as private. Foremost among them is to protect it during a security breach. This article list down top reasons encryption is not used by individuals as well organisations. Top Reason why we encrypt Here is what Bruce Schneier &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\"> <span class=\"screen-reader-text\">Top Reasons Encryption Is Not Used<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1982,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,37,26],"tags":[33],"class_list":["post-1981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-online-safety","category-security-alerts","tag-encryption"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Reasons Encryption Is Not Used - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"There is many reasons to password-protect \u2013 or encrypt \u2013 one&#039;s digital data. This article list down top reasons encryption is not used by individuals &amp; SMBs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Reasons Encryption Is Not Used - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"There is many reasons to password-protect \u2013 or encrypt \u2013 one&#039;s digital data. This article list down top reasons encryption is not used by individuals &amp; SMBs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-22T16:51:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-31T17:23:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"349\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"Top Reasons Encryption Is Not Used\",\"datePublished\":\"2019-03-22T16:51:38+00:00\",\"dateModified\":\"2019-05-31T17:23:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\"},\"wordCount\":1117,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg\",\"keywords\":[\"Encryption\"],\"articleSection\":[\"Data Protection\",\"Online Safety\",\"Security Alerts\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\",\"name\":\"Top Reasons Encryption Is Not Used - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg\",\"datePublished\":\"2019-03-22T16:51:38+00:00\",\"dateModified\":\"2019-05-31T17:23:16+00:00\",\"description\":\"There is many reasons to password-protect \u2013 or encrypt \u2013 one's digital data. This article list down top reasons encryption is not used by individuals & SMBs\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg\",\"width\":620,\"height\":349,\"caption\":\"top reasons encryption is not used\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Reasons Encryption Is Not Used\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Reasons Encryption Is Not Used - Kruptos Security Blog","description":"There is many reasons to password-protect \u2013 or encrypt \u2013 one's digital data. This article list down top reasons encryption is not used by individuals & SMBs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/","og_locale":"en_US","og_type":"article","og_title":"Top Reasons Encryption Is Not Used - Kruptos Security Blog","og_description":"There is many reasons to password-protect \u2013 or encrypt \u2013 one's digital data. This article list down top reasons encryption is not used by individuals & SMBs","og_url":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-03-22T16:51:38+00:00","article_modified_time":"2019-05-31T17:23:16+00:00","og_image":[{"width":620,"height":349,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg","type":"image\/jpeg"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"Top Reasons Encryption Is Not Used","datePublished":"2019-03-22T16:51:38+00:00","dateModified":"2019-05-31T17:23:16+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/"},"wordCount":1117,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg","keywords":["Encryption"],"articleSection":["Data Protection","Online Safety","Security Alerts"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/","url":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/","name":"Top Reasons Encryption Is Not Used - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg","datePublished":"2019-03-22T16:51:38+00:00","dateModified":"2019-05-31T17:23:16+00:00","description":"There is many reasons to password-protect \u2013 or encrypt \u2013 one's digital data. This article list down top reasons encryption is not used by individuals & SMBs","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/unencrypted.jpg","width":620,"height":349,"caption":"top reasons encryption is not used"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/top-reasons-encryption-is-not-used\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Top Reasons Encryption Is Not Used"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1981"}],"version-history":[{"count":1,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1981\/revisions"}],"predecessor-version":[{"id":1983,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1981\/revisions\/1983"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1982"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}