One of the best practices for encrypting data in transit is to use secure protocols, such as HTTPS, SSL, TLS, or SSH, which create a secure channel between the sender and the receiver of the data. These protocols use a combination of symmetric and asymmetric encryption to establish a secure connection, authenticate the parties, and encrypt the data. Another best practice for encrypting data in transit is to use virtual private networks (VPNs), which create a secure tunnel between two or more devices or networks over the internet. VPNs use encryption, authentication, and tunneling protocols to protect the data from eavesdropping, spoofing, or modification.