Wipe out attacks inside the encrypted data-P2 | Connecting IT