The first step in keeping information locked away from prying eyes is to make it safe in transit across the networks that connect users. That means using encryption suitable to the type of information ...