....that encryption is pointless unless other steps are in place such as background checks, physicalaccess controls, transportation plans and connectingdecryptedfiles onto a system connected to the network and internet(let's not gointo that here), how many of those who worry about excryption are going to lose sleep over this?
SSH being used by automated services (back ups, file transfers etc.), enven the SSH protocol's author Tatu Ylonen is warning against it and suggesting a new version of SSH (SSH2 was created in 1996) due to poor key management (OK they sell key management toolsets and their crypto auditorsoftwareis awesome , try it!).
It would be helpful if you read both of these before commenting so that you understand the issue, it isn't as simple as it seems and may answer any questions you!