
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Data Encryption Video: Challenges to Encrypting Data","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fQiDoys5E3\"><a href=\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\">Data Encryption Video: Challenges to Encrypting Data<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/embed\/#?secret=fQiDoys5E3\" width=\"600\" height=\"338\" title=\"&#8220;Data Encryption Video: Challenges to Encrypting Data&#8221; &#8212; OTAVA\" data-secret=\"fQiDoys5E3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining the many challenges to encrypting data and walking through best practices for a high level of data security. There are many different levels at which you need to encrypt your data. Strong security means thinking about physical security &#8211; if someone is able to gain physical access to your server or data center, they can potentially decrypt your data if they steal the device. Using disk-level encryption of data at rest helps protect against physical theft of data. If someone were to pull out a few drives from a storage array, they wouldn&#8217;t be able to recover any of the data. Aiello also describes the challenges with commercial software and encryption. Another challenge is the administration of the server. One question to ask is if your cloud provider allows you the option of using a VPN (Virtual Private Network) so you can manage your own servers securely. Watch the full video on our site. Learn more about encryption of data at rest and in transit on our\u00a0Defense in Depth\u00a0page. The increased cyber threats of hackers and data theft presents a strong...","thumbnail_url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"}