First page Back Continue Last page Overview Graphics
Cryptography isn't really an option!
Cryptographically enhanced systems offer the protection you need now, to protect your systems, your users and their data.
Important first steps:
- Use SSH exclusively for system administration.
- Use SCP/SFTP for all file transfers not wrapped in SSL or done anonymously.
- Install POP3/IMAP and SMTP servers with TLS support.
- Use SSL/HTTPS for applications involving passwords or proprietary data (like webmail applications).