From the course: Securing Your Home Office

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Encryption

Encryption

From the course: Securing Your Home Office

Start my 1-month free trial

Encryption

- [Instructor] Just as we need to make sure hardware is difficult for unauthorized people to access, we can use encryption to protect data at rest, that is, when it's not being used, when the computer is powered off, or when a drive is unplugged or unmounted. Encrypting the system's boot disk and any other disks inside the computer will help to protect information in the case that the computer is stolen or lost. All major operating systems support this, and doing so is a security best practice. For company owned hardware, disk encryption should be configured by the IT department, not by individual users, for a variety of reasons. Usually the company will keep a decryption key in case a user forgets their password and is locked out of their account. And in some cases, the encryption needs to happen when the system is configured for the first time, and that's not something most users of corporately-owned computers will be…

Contents