Windows Device Encryption Management

Reduce the risk of stolen, misplaced or lost data

What is encryption and why should you use it?

There’s a lot of confidential or sensitive data that is stored, exchanged, or transmitted over the Internet on a daily basis -- mails, medical records, data on personal buying habits, legal documents, credit histories and transactions, and government and regulatory agency databases, to mention a few. However, the simple fact of the matter is, the more access we have on computer networks, the less protected our data is from the growing threats of virus attacks, computer hackers, or careless users. Surely, everyone wants peace of mind knowing that their information will always be kept safe.

To keep data secure, it’s important to use encryption as a means of translating data into another format, code or alternate language to make it hard to break and therefore provide the highest level of security protection. Not only is encryption important to have on personal devices; it’s mission critical for organizations and those using cloud technologies to protect their business data and the legal liability over this information.

Consider these questions:

  1. Do you keep personal data on your computer such as your Social Security Number, private photos and videos, or medical records?
  2. Do you keep financial information on your computer such as bank statements or tax returns?
  3. Do you ask your computer to remember your login and password to the web sites where you shop or do your banking?
  4. Do you infrequently delete your cookies and form data?
  5. Are you a small business owner or a professional such as a lawyer, doctor, nurse, accountant or contractor who carries clients' proprietary data on your computer?

If you answered "Yes" to any of these questions, you will benefit from the extra security of encryption.

Types of encryption

Internet Traffic Encryption

If you’re on an unsecured Wi-Fi network (at an airport, for instance), a hacker can intercept the data traveling to and from your laptop, which might contain sensitive information. To make that data useless to eavesdroppers, you can encrypt it, using a virtual private network (VPN). A VPN creates a secure “tunnel” to a trusted third-party server. Data sent through this tunnel (either to or from your computer) is encrypted, so it’s safe even if intercepted. You can find Web-based VPNs that charge a small monthly fee but provide very easy access, or you can set up your own personal or business VPN.

Email Encryption

Your email messages can contain some very sensitive information, which makes them a prime candidate for encryption. If you use Outlook, keeping your correspondence secure is easy. Outlook encryption is not password-based. Instead, everyone who wishes to use cryptographic security features in Outlook receives a digital certificate, which serves to automatically encrypt and decrypt messages. Before two users can send each other encrypted messages, they must share their certificates by sending each other digitally signed messages.

Hard Drive Encryption

Hard drive encryption makes everything on your computer's hard drive unreadable to unauthorized eyes. It jumbles the data in such a way that it cannot be deciphered unless a special password is entered. If your PC is stolen or lost, hard drive encryption prevents your personal data from getting into the wrong hands, even if you never recover your hardware.

Unsurpassed Data Protection

All your data is fully protected - even temporary and deleted files. Your encrypted hard drive is inaccessible unless a special login and password are entered. No password, no access - thieves are locked out. This login cannot be bypassed by removing the hard drive or by booting off a CD.

Advanced Technology

Hard drive encryption installs an encryption/decryption driver that acts as a filter between the operating system and the hard disk to ensure that all data stored on or retrieved from the disk is encrypted or decrypted on the fly and automatically as it is accessed. The process encrypts data at about 20 to 30 GB/hour and is completely fault tolerant – immune to power loss or computer shutdown.

If you feel you need assistance in setting up or managing data encryption on your devices and hardware, ArcLight Group is here to help. Just get in touch with us and we look forward to answering any additional questions and helping you explore the best path for your organization.

Client Tools