The greatest concern to an IS auditor reviewing an organization's method to transport sensitive data between offices should be the use of asymmetric encryption algorithms. Asymmetric encryption algorithms are a type of encryption that uses two different keys, one public and one private, to encrypt and decrypt data. The public key is used to encrypt the data and the private key is used to decrypt it. This system is more secure than other methods, such as 128-bit encryption, as it ensures that only the sender and receiver of the data are able to access the data. However, this system can be vulnerable to attacks if the keys are not properly secured.