{"id":4852,"date":"2020-05-25T12:40:00","date_gmt":"2020-05-25T09:40:00","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=4852"},"modified":"2020-05-25T12:33:28","modified_gmt":"2020-05-25T09:33:28","slug":"how-encryption-can-help-protect-your-sensitive-data","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/","title":{"rendered":"How encryption can help protect your sensitive data"},"content":{"rendered":"\n<p>You probably store all kinds of sensitive information on your personal computer \u2013 or your smartphone, for that matter. For good measure, you may even store your data in the cloud. And like the responsible netizen that you are, you\u2019ve probably&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/05\/forget-about-passwords-you-need-a-passphrase\/\" target=\"_blank\" rel=\"noreferrer noopener\">secured access to your devices with a passphrase<\/a>, a biometric lock or even a combination of both. That\u2019s all well and good, but what if you&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/04\/06\/what-to-do-phone-lost-stolen\/\" target=\"_blank\" rel=\"noreferrer noopener\">lose your device or it is stolen<\/a>? That\u2019s where encryption comes in, adding an extra safeguard.<\/p>\n\n\n\n<p>To be sure, encryption isn\u2019t just limited to storing your data; you can also encrypt your communications and your web traffic, as well as your passwords. All of these can be considered best practices to secure your private data, and we\u2019ll walk you through some of the choices you have.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disk encryption<\/h2>\n\n\n\n<p>Most computers still have removable hard disks that aren\u2019t soldered onto the motherboard; alternatively, as extra storage, people use external disks. That\u2019s why having full-disk encryption is a great extra security layer: if you misplace your disk or it is stolen, then no one can access any of the information on it. The disk is fully encrypted, including all your data, your software and the operating system you\u2019re running. Unless you can enter the key at boot-up, your whole computer essentially becomes quite an expensive paperweight. There are several commercial options with advanced features, open source projects and built-in options in most major operating systems.<\/p>\n\n\n\n<p>When it comes to smartphones and tablets, the equivalent functionality to look for is device encryption, which is built into, and commonly enabled by default, on contemporary devices. There are many easily found online guides that explain checking for and, if necessary, enabling device encryption for Android or iOS devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud encryption<\/h2>\n\n\n\n<p>Most of us use cloud storage for its ease of access \u2013 you can do it from anywhere at any time so long as you have an internet connection. Unfortunately, that accessibility introduces its own set of challenges. Over the years, cloud storage services have experienced security breaches, either due to human error or targeted attack by ne\u2019er-do-wells. Therefore, encrypting your files before uploading them to the cloud should be a no-brainer.<\/p>\n\n\n\n<p>Even if there is a breach or the cloud provider\u2019s system is compromised, the data bad actors may obtain will be useless to them without the decryption key. You can choose from a variety of products based on your needs and the offered encryption features. Look at those that offer AES encryption at the very least. There are a number of free and commercial options, all with various limitations and a range of price options among the paid-for products and services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encrypt your web traffic<\/h2>\n\n\n\n<p>One of the easiest ways you start with is by&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/03\/18\/work-home-how-set-up-vpn\/\" target=\"_blank\" rel=\"noreferrer noopener\">setting up a Virtual Private Network (VPN)<\/a>, which works as an encrypted tunnel for internet traffic. Let\u2019s say you\u2019re working from a coffee shop and you are going to share some sensitive data with a client: a VPN will allow you to share that data over an encrypted network without anyone intercepting it. Another example is that you can securely access data stored on your home network even if you are physically on the other side of the globe. There are multiple types of VPNs to choose from and, if you\u2019re not sure which one will suit your needs the best, you can check out our&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/07\/07\/types-vpn-networks-work-know-kind-use\/\" target=\"_blank\" rel=\"noreferrer noopener\">article on types of VPNs<\/a>.<\/p>\n\n\n\n<p><em>RELATED READING:&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/02\/04\/encryption-101-useful\/\">Encryption 101: What is it? When should I use it?<\/a><\/em><\/p>\n\n\n\n<p>Another&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/01\/21\/3-ways-browse-web-anonymously\/\" target=\"_blank\" rel=\"noreferrer noopener\">way to protect your privacy<\/a>&nbsp;involves using an anonymity network, such as&nbsp;<a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tor<\/a>. The Tor network directs your traffic through a volunteer overlay network of relays and wraps it in multiple layers of encryption. The idea is, of course, to protect your identity and your browsing habits from anyone snooping around.<\/p>\n\n\n\n<p>Another thing you should also always watch out for is that the website you\u2019re accessing uses the HTTPS protocol. The S stands for secure and means that all the communication taking place between the visitor (you) and the webserver is encrypted.&nbsp;Most of the world\u2019s top websites now use HTTPS&nbsp;by default.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encrypt your messages<\/h2>\n\n\n\n<p>When it comes to messaging apps, you have a variety to choose from and while the most popular do offer end-to-end encryption, not all of them have it turned on by default. For example, to turn on end-to-end encryption in Facebook Messenger you have to start a secret conversation by clicking on the profile picture of the user and choosing \u201cGo to secret conversation\u201d; only after that do your messages with that specific recipient become encrypted. WhatsApp, for one, has the option turned on by default; so does Telegram, but it also provides an extra layer of security with its&nbsp;<em>Secret Chat<\/em>&nbsp;feature, which allows you to set self-destruct on the messages and files you send.<\/p>\n\n\n\n<p>Signal remains one of the most highly rated options by cryptographers, due to its open-source code allowing extensive examination and easy auditing by area specialists. You can also encrypt your email communications as well, with the sender needing your public key to encrypt a message, so that only you can decrypt and read it using your private key, and you needing their public key so they can decrypt encrypted messages you send to them. Again, there are several options, with the most common being PGP or GPG, and S\/MIME. There are several plug-ins for, or built-in options in, popular email apps. For example, Microsoft provides a&nbsp;<a href=\"https:\/\/support.office.com\/en-us\/article\/encrypt-email-messages-373339cb-bf1a-4509-b296-802a39d801dc\" target=\"_blank\" rel=\"noreferrer noopener\">handy guide<\/a>&nbsp;on how to enable S\/MIME in its Outlook email client.<\/p>\n\n\n\n<p>Also worth considering is using a secure email platform,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/03\/17\/protonmail-encrypted-key-secure-future\/\" target=\"_blank\" rel=\"noreferrer noopener\">such as ProtonMail<\/a>&nbsp;and others, that provides end-to-end email encryption. Some are \u201cclosed shop\u201d in that you can only send encrypted emails to others using the service and \u201cordinary\u201d emails to those with other providers, while some provide mechanisms to exchange encrypted messages regardless of the mail service of your interlocutors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encrypt your passwords<\/h2>\n\n\n\n<p>Password managers are a popular choice for people who don\u2019t want to (or can\u2019t) memorize all their passwords while&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/05\/03\/recycling-reuse-password\/\">refraining from recycling<\/a>&nbsp;them. A password manager functions as a vault that stores all of your passwords: it is secured like a bank vault is, but in this case, it uses fiendish mathematics instead of steel-reinforced concrete.<\/p>\n\n\n\n<p>Most of the cloud-based services keep a copy of your vault on their servers protected with heavy-duty encryption, and, for an extra layer of security, allow their users to use&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/12\/13\/2fa-double-down-your-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a>. It is a much more secure way to store your passwords than on sticky notes or docs in your computer or even using a one-password-fits-all solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final thoughts<\/h2>\n\n\n\n<p>Although at first glance you may think that the number of things you can do to secure your digital existence is a bit overwhelming, but you should never underestimate the value of good cybersecurity measures securing your digital existence. As the old saying goes, an ounce of prevention is worth a pound of cure, and in the digital world that goes double. A responsible approach to securing your data today can save you from a huge migraine in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You probably store all kinds of sensitive information on your personal computer \u2013 or your smartphone, for that matter. For good measure, you may even store your data in the cloud. And like the responsible netizen that you are, you\u2019ve probably&nbsp;secured access to your devices with a passphrase, a biometric lock or even a combination<\/p>\n","protected":false},"author":5,"featured_media":4853,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[150],"tags":[],"class_list":["post-4852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How encryption can help protect your sensitive data - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How encryption can help protect your sensitive data\" \/>\n<meta property=\"og:description\" content=\"You probably store all kinds of sensitive information on your personal computer \u2013 or your smartphone, for that matter. For good measure, you may even store your data in the cloud. And like the responsible netizen that you are, you\u2019ve probably&nbsp;secured access to your devices with a passphrase, a biometric lock or even a combination\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T09:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/How-encryption-can-help-protect-your-sensitive-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"How encryption can help protect your sensitive data\",\"datePublished\":\"2020-05-25T09:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/\"},\"wordCount\":1226,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/How-encryption-can-help-protect-your-sensitive-data.jpg\",\"articleSection\":[\"encryption\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/\",\"name\":\"How encryption can help protect your sensitive data - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/How-encryption-can-help-protect-your-sensitive-data.jpg\",\"datePublished\":\"2020-05-25T09:40:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/How-encryption-can-help-protect-your-sensitive-data.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/How-encryption-can-help-protect-your-sensitive-data.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How encryption can help protect your sensitive data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/25\\\/how-encryption-can-help-protect-your-sensitive-data\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How encryption can help protect your sensitive data - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/","og_locale":"en_US","og_type":"article","og_title":"How encryption can help protect your sensitive data","og_description":"You probably store all kinds of sensitive information on your personal computer \u2013 or your smartphone, for that matter. For good measure, you may even store your data in the cloud. And like the responsible netizen that you are, you\u2019ve probably&nbsp;secured access to your devices with a passphrase, a biometric lock or even a combination","og_url":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2020-05-25T09:40:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/How-encryption-can-help-protect-your-sensitive-data.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"How encryption can help protect your sensitive data","datePublished":"2020-05-25T09:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/"},"wordCount":1226,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/How-encryption-can-help-protect-your-sensitive-data.jpg","articleSection":["encryption"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/","url":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/","name":"How encryption can help protect your sensitive data - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/How-encryption-can-help-protect-your-sensitive-data.jpg","datePublished":"2020-05-25T09:40:00+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/How-encryption-can-help-protect-your-sensitive-data.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/How-encryption-can-help-protect-your-sensitive-data.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"How encryption can help protect your sensitive data"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/25\/how-encryption-can-help-protect-your-sensitive-data\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/4852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=4852"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/4852\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/4853"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=4852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=4852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=4852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}