Online Security: Data Encryption | Lexika
/

Online Security: Data Encryption

Simona Pralovska Ciferník29.10.2021 For Customers Reading time: 2 min.
Data Encryption on computer

Nearly all of us store sensitive information, documents, and client data on our computers that are subject to the General Data Protection Regulation.

In our series of articles, Online Security, we’ve introduced you to some essential online safety precautions. Now it’s time to explore another: data encryption.

Why is data encryption important?

When your device gets stolen, the thief doesn’t need the password to access it. To retrieve unencrypted data, all they need is to remove the disk and connect it to another computer.

How does data encryption work?

Data encryption converts all of the information in your computer into unreadable code that can only be deciphered by an authorised user with the key. Ordinary (authorised) users can work on an encrypted computer without experiencing any visible changes.

If you accidentally lose the computer or it’s stolen, then rest assured that sensitive data will not be accessible by unauthorised people.

Encryption apps encrypt the data so that it‘s irretrievable without a password.

Data encryption software

Computers running Windows 10 Professional can be encrypted via the built-in MS BitLocker software, or you can use another from different vendors.

VeraCrypt is an unpaid option providing basic protection. More advanced security is offered by companies like ESETCheck Point, and Broadcom.

FileVault encryption is provided on macOS computers.

We also highly recommend encrypting smartphones and tablets with Android and iOS operating systems. Both offer their own encryption tools.

Follow these instructions to encrypt your data on Windows and macOS.

What data should I encrypt?

You should encrypt data on all devices such as:

  • computers/laptops, smartphones, and tablets;
  • external drives;
  • portable storage media (USB flash drives, memory cards); and
  • sensitive data repositories.

Encryption and sensitive data transfer

When sending a single document to a customer or colleague, the easiest security method is encrypting it to the program in use:

  • MS Word, PowerPoint, Excel: click on File >> Info >> Protect Document
  • Adobe Acrobat: click on File >> Protect Using Password

In order to password-protect multiple documents, utilize compression programs, such as WinRARWinZip , and 7-zip. These ensure that no one can open any file without a password, nor can they see the contents of the compressed archive.

Always send the password to open an encrypted document via a different channel than the encrypted data.

For example, if you are sending encrypted data through email, then send the password through SMS, Signal, WhatsApp, etc.

Note: Most of our recommendations are easily and cost-effectively implemented by average computer users. If you are unsure, then consult the person managing your information technology before proceeding.

The last article in our Online Security series deals with the security of online machine translators. Find more on our blog or Facebook page

Simona Pralovska
Simona Pralovska
Vendor manager

I began my journey at LEXIKA during my university days in 2017. LEXIKA, the people that form part of it, and the translation industry have grown on me since then. One of the day-to-day challenges I have to face is finding new talented translators. Furthermore, I take care of developing good and open relationships with our long-standing translators who make it possible for us to do what we love. Over time, I was put in charge of marketing activities and internal HR. I don’t have to worry about my job turning into a daily grind and I learn something new every day. ?

Read more

Do you like our blog?
Share it!

Leave a Reply

Your email address will not be published. Required fields are marked *