October 12, 2022

Encryption: What does it entail?

Due to the numerous advanced attacks that have occurred over the past few years, cyber security is a hot topic. Cyber attacks, including data breaches, customer leaks, distributed denial of service (DDoS), and impersonation attacks, have targeted and significantly impacted numerous local and international enterprises.

To protect against a variety of cyber threats, numerous defence strategies and services are available. Encryption is one of the latest buzzwords in this field. Most people have a basic understanding of what encryption is and why it's a valuable form of security, but how can large enterprises and small businesses benefit from advanced encryption?

How does encryption actually work?

Data is scrambled during the encryption process so that only the sender and receiver can recognise it. It was extensively used to send orders and messages to front-line soldiers during World War 2. These coded messages wouldn't be recognisable to the enemy if they were intercepted. The process remains the same in digital terms.

Data encryption encodes plain text into cyphertext, which can only be accessed and understood by users who have the right cryptographic key. It converts readable data into a scrambled jumble of numbers and letters that only authorised users can decode. End-to-end encryption is used by WhatsApp and many other messaging services to improve user privacy.

This is a basic form of encryption that scrambles data at one end and decodes it at the other. Any software or person intercepting the data won't be able to make sense of it because only the intended recipient can decrypt the data.

Encryption offers the same benefits in the business world. It's essential for privacy protection and prevents malware, hackers, and scammers from getting their hands on sensitive data. It ensures that businesses protect both their critical data and the personal information of their customers.

Two types of encryption

There are two basic forms of encryption, each with particular advantages and purposes:

Symmetric encryption - Here, both encryption and decryption are accomplished using the same key (decipher code). This key is securely transferred between the sender and the receiver. Although it is fast and efficient, it is an outdated form of security that is still vulnerable to hacking.

Asymmetric encryption - Here, encryption and decryption each use a different key. A public key is shared with the authorised receiver or made available to the general public, while the sender retains the private key. Data encrypted with the public key can only be decrypted using the corresponding private key, preventing unauthorised access to the data. This approach is more secure because two keys are required.

Encryption in transit vs encryption at rest

Data at rest and data in transit (or in motion) can both be encrypted. Data in transit is most likely to be used day-to-day in a business. Whether on-premises or on the cloud, it is stored in a database and accessed through software and applications. Sincee it is sent and received, it is said to be "in transit." Data at rest is stored and protected by a firewall or software.

Both types of data can be encrypted. Think of it like putting data in transit into an armoured car as it travels, whereas data at rest is stored in a steel vault. The encryption adds an additional layer of security to business data. For encryption in transit, the devices are authenticated, the data is scrambled before transmission, and the data is decrypted upon arrival. For encryption at rest, the data is scrambled and left in this state until it is needed.

Businesses must make sure they use encryption for both types of data. Encryption at rest is required if customer records, bank accounts, and personally identifiable information are stored on servers. Encryption in transit should be used if employees frequently access and modify business records and supplier data.

Best practices for added protection

Unencrypted data is susceptible to exposure, whether it is in transit or at rest. IT teams should implement a number of best practices for data protection, in addition to encryption:

  • Set up advanced network security controls, including firewalls, zero-trust access control, anti-malware and multifactor authentication.
  • Make data security a priority by identifying information that is vulnerable and putting the necessary encryption or protection measures in place.
  • Choose data protection solutions from reputable suppliers, such as SEACOM Business, that can offer secure policies that enable user blocking and automatic encryption.
  • Create internal policies for systematically classifying all business data regardless of where it is stored or sent.
  • Implement automatic backup and recovery of lost or stolen data.

SEACOM Business offers companies in Kenya a range of cloud and cyber security solutions. These include advanced data encryption on business networks. For more information or to get a quote for our network architecture services that include encryption, email us at marketing@seacom.com or leave us a message.


SEACOM owns Africa’s largest network of information and communications technology (ICT) infrastructure, including fibre optic networks and subsea cables. We offer a wide range of industry-leading scalable ICT solutions for large companies that operate throughout the region.

SEACOM is privately owned - making it adaptable to the needs of the client. We are the preferred ICT and internet connectivity supplier for African enterprises. We can guarantee fast, reliable and secure internet and networking services at affordable prices.

For‌ ‌more‌ ‌information‌ ‌on‌ these solutions, ‌follow‌ ‌us‌ ‌on‌ ‌‌LinkedIn‌,‌ ‌‌Facebook‌ ‌or‌ ‌‌Twitter.‌ ‌Keep‌ ‌an‌ ‌eye‌ ‌on‌ ‌our‌ ‌‌news‌ ‌section‌‌ ‌for‌ ‌industry news and announcements on African ICT, internet connectivity, cloud services and security solutions.