
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Why, What and How to Encrypt: Security Expert Insights","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UPWw7ZOSQB\"><a href=\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\">Why, What and How to Encrypt: Security Expert Insights<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/embed\/#?secret=UPWw7ZOSQB\" width=\"600\" height=\"338\" title=\"&#8220;Why, What and How to Encrypt: Security Expert Insights&#8221; &#8212; OTAVA\" data-secret=\"UPWw7ZOSQB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Not sure if your organization\u2019s sensitive data is properly encrypted? It\u2019s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech. Heuman cites that unencrypted data is being breached regularly, and those breaches come at a staggering cost. On average, security breaches affect 42,659 individuals and cost organizations $8,275,865 (yes, that\u2019s nearly $8.3 million) to respond. That price tag includes the cost of fines, penalties, legal counsel and distribution of settlements to harmed individuals, but does not include the financial equivalent of the damage made to an organization\u2019s reputation, the resources needed to respond to unannounced audits in the future or myriad other related costs. \u201cWhen you think of these numbers and compare it to the cost of implementing an encryption program, you\u2019ll find the expense of the program isn\u2019t quite as high as you thought it was,\u201d he said. Heuman\u2019s presentation, titled Encryption: Perspective on Privacy, Security &amp; Compliance, was the first of three encryption-focused presentations scheduled for the month of June. Online Tech software development manager Farooq Ahmed and Mark Stanislav of Duo Security will co-host Encryption at the Software..."}