In this post I’ll continue on the topic of data encryption (see my previous post on Encrypting Data At Rest).