Security News > 2024 > July > Encryption Policy
Encryption is vital for securing data, whether in transit or stored on devices.
This policy from TechRepublic Premium provides guidelines for adopting encryption technologies for organizational use that have undergone extensive technical review, are not encumbered by patents or copyright and have been proven to work reliably.
HASH FUNCTIONS REQUIREMENTS. SHA-3 should be preferred for any application that uses secure hash algorithms.
SHA-2 may be used for any application that uses secure hash algorithms.
Beef up your data security with our six-page policy document.
Download for $9 or Access all downloads for $299/yr*.
News URL
https://www.techrepublic.com/resource-library/toolstemplates/encryption-policy/