Business and Technology in Plain English Join Our Learning Community

Understand the baffling technology words and phrases you hear every day.

What is Data in Transit?

Data in transit, also called data in motion, is data that is actively moving from one location to another. This can be across the internet, within a private network, or from one device to another.

So much of what we do daily involves data in transit. Sending an email, browsing online, accessing cloud applications, and sending a text all create data in transit.

How is This Data Protected?

As your data moves across the internet or a private network, it passes through several servers, exchanging information (handshakes) before it reaches its destination. It isn't a single point A to point B "hello" "I got it" communication. This means opportunities for the wrong people to access your data.

End-to-end encryption is recommended for secure data exchange. This ensures that data is encrypted so that only the sender and receiver can access it.

What is Data at Rest?

As its name implies, data at rest is data that is not actively moving. It is data stored on a hard drive or archived to a storage device. For example, email stored in your email application such as Outlook, and files stored on your laptop are both data at rest.

How is This Data Protected?

While it can seem that idle data is safe from unauthorized access, this is not the case. Anyone with access to your device or network storage can easily grab the data. Consider this --- when you save a file to your laptop, it is saved in the same plaintext format as created. When anyone opens the file, it is readable. This is why data at rest should be encrypted.

The best practice is to encrypt the data as well as all storage devices.

Companies should start by identifying all their sensitive data. Where does this data live? How is it accessed? Who has access to it? The data inventory will vary with each company and will continually change.

Data management should be an ongoing company commitment to protect both the company's and its clients' and customers' valuable data.

Keep Learning

What is Encryption?
What is End-to-End Encryption?

. . . . .

How We Help You

    Partnering as Your Outsourced CIO and CTO
    Taking Your Growth Strategies from Idea to Execution
    Managing Your Internal Company Security
    Building Productivity Tools and Services
    Discovering New Growth Opportunities
    Building Valued Customer Experiences
    Creating SaaS Revenue Streams
    Earn Girl Scouts Cybersecurity Badges

© 1991-2022 Quest Technology Group, LLC All rights reserved.
Your Privacy Matters

 Our Knowledge Partner Promise

Quest Technology Group
315 E. Robinson Street
Suite 525
Orlando, FL 32801
Phone: 407 . 843 . 6603
Subscribe to Our Community