The number of cyberattacks has increased in recent years due to better understanding the value and relevance of information and data, especially for highly competitive sectors. Pullin (2018) states that every company is vulnerable to cyberattacks which could compromise clients and employees confidential data. Accordingly, all organizations have an obligation to protect clients and employees data in order to meet privacy policies and maintain competitive advantages within their markets and industries. Organisations might ostensibly use multiple encryption methods to protect their data from hackers, both at rest and during transit.
Hackers can target data both in motion and at rest, so organizations need to encrypt them both. Yang et.al. Yang et al. (2020) state that data at rest can be encrypted with transparent data encryption (TDE), which does not require any modifications to either the design or application logic. This encryption method is compatible with Oracle and MySQL as well as DB2. Pullin (2018) notes that data encryption at rest (or Data At Rest Encryption) does not require or use additional technologies. Safe management is seamlessly integrated. Only authorized persons can access or see any data that has been backed-up or saved.
Cyberattacks can be very effective against information that is in transit. Cybercriminals can target data while it is transit because many networks have vulnerabilities or flaws which are easily exploitable. Because it shields all users communicating over a network (email, chat platforms or text messaging) from hackers that may intercept data as it travels, end-to-end encryption can be advantageous. End-to-end encryption encrypts data at sender’s ends and then decodes it at recipient’s. The encrypted data remains secure throughout transmission and transit. Yang et al. Yang and colleagues. The process uses cryptographic protocols such as Transport Layer Security and Secure Sockets Layer to authenticate data transfers over networks.