Describe the role encryption plays in protecting data. Examine where an organization should begin when it comes to choosing an encryption vendor. What features make up an effective encryption method?
Be sure to post an initial, substantive response by Thursday at 11:59 p.m. MST and respond to two or more peers with substantive responses by Sunday at 11:59 p.m. MST. A substantive initial post answers the question presented completely and/or asks a thoughtful question pertaining to the topic. Substantive peer responses ask a thoughtful question pertaining to the topic and/or answer a question (in detail) posted by another student or the instructor.