{"id":1921,"date":"2007-08-22T00:00:00","date_gmt":"2007-08-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/22\/unencrypted-networks-threaten-data-security\/"},"modified":"2021-12-30T11:40:17","modified_gmt":"2021-12-30T11:40:17","slug":"unencrypted-networks-threaten-data-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/22\/unencrypted-networks-threaten-data-security\/","title":{"rendered":"Unencrypted networks threaten data security"},"content":{"rendered":"<p>Almost 40 per cent of UK organisations admit to protecting less than a quarter of their network traffic, according to the annual security survey conducted by SafeNet.  The report revealed that five per cent of UK organisations have no security measures at all to protect the data crossing their networks, a slight improvement from six per cent in 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The level of encryption required will obviously vary from organisation to organisation, but companies should be looking to encrypt as much network traffic as possible, if not all of it,&#8221; said Gary Clark, vice president of SafeNet in EMEA.  &#8220;However, I am concerned to see that the number of organisations implementing security measures and encryption policies has decreased over the past 12 months.&#8221;<\/p>\n<p>http:\/\/www.vnunet.com\/vnunet\/news\/2197101\/unencrypted-networks-data<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1921","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1921"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1921\/revisions"}],"predecessor-version":[{"id":4408,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1921\/revisions\/4408"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}