Business computer encryption solutions along with better password management can help you plug potential cyber security leaks before they start!
We’re going to talk about:
- Encrypted USB Drives
- Hard Drive Encryption
- Centralized Password Management
Encrypted USB Drives
Here’s a video about the encrypted USB drives I’ve mentioned in the past. The video runs just over 3 minutes and is probably worth the watch: https://www.youtube.com/watch?v=a6kr9mv4Dds
We have these in stock, on the shelf today. If your company uses USB drives in any capacity, consider using these. Random USB drives purchased from WalMart or online have been known to contain malware from the factory. Not good Keep in mind that if the password used to encrypt the data on one of these drives is lost, the data is lost with it! On the flip side, if the USB drive is lost, you’re out the purchase price, not the data contained on the drive.
Hard drive encryption can help alleviate fears about physical theft of devices. If you’re concerned about losing a laptop or workstation, hard drive encryption is the solution. Pros: the drive data is only accessible if you’re logged in and working on the machine. Left it in the car and it was stolen? You only lost the machine, not the data. Cons: if you forget the decryption key (usually a PIN code), the data on the drive is gone. Not unavailable, it’s gone. This can create real havoc if you have lots of forgetful team members.
As we encrypt drives we’ll have a ticket record of the work being completed along with the SP tag number on the machine to show it was encrypted. If the machine’s lost, this greatly reduces any company’s exposure to potential data breach.
Centralized Password Management
Scenario: An employee quits. They don’t write down the passwords they use. You spend hours, maybe days resetting passwords and you’re not sure you got them all. Solution: Centralized Password Management.
We have a solution to this. As an owner/manager you can enforce password changes for all employees in all the things they use both on the PC, on the web and in any phone apps in use. You can enforce proper online password policies (like complexity) and eliminate the re-use of passwords from one site to the next by the same person. You can also stop having to remember your own passwords and let the management tool remember them for you. Quite honestly once it’s running correctly it’ll probably become an invaluable tool for you as it has for me.
Other good things – re-use of passwords and lack of password rotation is a real problem. Attackers are re-using passwords once they’ve been shared online with other attackers. Huge databases of passwords from places like Yahoo, Facebook and others when your password data has been lost. Enforcing different, complex passwords from one site or application to the next greatly reduces the chances you or your employees will fall victim to this type of compromise.
We talked about USB drives, hard drive encryption and password management. All fairly simple things to implement in your company along with a 1 or 2 page policy to enforce and regulate their use. Along with a larger-scope perspective on your security policies, these are excellent products and methods to get your company moving toward much better security in a world where cyber attacks, data theft and data breach are happening every day.
Are you interested in learning about these solutions? We use these solutions ourselves and can vouch for how well they work along with some of the pros and cons of each.
Contact Mike Fink if you want to know more: 701-390-9876 or firstname.lastname@example.org
I’ve made it my mission to build a business that represents the best in technology service. I am so impressed with the people we have at SP, and I think you will be too! — Dan Polk