What happens if your notebook gets lost or stolen? What happens if you have important date in your files? What happens if it falls into the wrong hands?
Is that data protected from prying eyes?
The NY Times writes What computer owners may not know is that a computer’s standard log-on password does not block access to files on the hard disk. That line of defense can be bypassed by removing the disk and connecting it to another computer, by using forensics tools or by booting the computer to a different operating system.
Various methods of file encryption are available to protect files against these kinds of direct assaults. Some of the newer ones are easy to set up and can run seamlessly in the background as you go about your work. They can encrypt individual files, or they can create “vaults” in which many files can be encrypted at once. Some can encrypt entire hard disks while others integrate smart cards or U.S.B. tokens to add extra security.
To help decide whether file encryption is for you, it is useful to know some basic information about the technology, its limitations and how to spot products that may contain weaknesses.
Latest posts by Ramon Ray (see all)
- How Leaders Can Build a More Collaborative and Productive Virtual Team - September 15, 2017
- How to Create an Effective and Cohesive Online and Offline Marketing Strategy - September 15, 2017
- Salesforce Upgrade Its Customer Service Platform. Faster Setup Time. - July 27, 2017