The data present on the information systems are not all the same and not all have the same importance.
Those who have knowledge of security know that it is not possible to guarantee the inviolability of systems at 100%, but we can ensure that our most precious data, even if “touched” by a security breach, remain invulnerable.
To adequately protect relevant corporate and personal data, encryption is used.