The time we’re living in forces us to store some files, folders, documents etc. without which, we might not be able to start our day. However its very presence in our custody makes it admirable for those who you do not trust. Unauthorized access to the information on your PC, portable devices etc. can be worked out remotely if the hacker is smart enough to get beyond the average protection layer we all use.
The protection doesn’t require you to place hundreds of guards around your PC just to stay safe no, but it does ask you to do whatever it is possible for you to deliver. Hence, in our view, both physical as well as digital security is mandatory for sole survival.
A universal fact is that multiple layers of security is much better than a single security layer. However, to achieve this level, you only have two options,
- hide your files
By hiding we do not mean to hide them physically, but to make them hidden from their true location. This makes it hard for anyone to identify the exact location and hence make changes to it or simply get away with it. But we do not recommend you to use it. It’s a method that is quite possibly becoming obsolete and all the methods of security involving such feature like password protection, anti-viruses, etc. are running towards the maturity of their lives. We only recommend you to use it if you’re not in possession of confidential files or folders and that security is only a formality for you.
- encrypt them
Yes, we recommend this option. We do that as we’ve tried this method and it treats our data as if it’s one of its own. As a parent takes care of their child, encryption does the same for you. But again encryption also has dual or more faces and not each setup of encryption is for you to trust upon. One is built-in encryption and the other is external encryption option. The built-in option is the one already provided by Windows. It is easy to use but also easy to penetrate as well. Any geek having a bit of information can attempt to access your data if you’re using the built-in option.
The external encryption security option is the one we’d recommend. By external we mean you getting an encryption software or encryption program to tackle the threats around you. You will just need a few steps to follow to learn how to encrypt files using these encryption tools and it will be done.
Precautions you could use:
There are a few conditions in which you should not leave your encrypted volumes mounted:
- For instance, while you walk away from your computer for a distance, disconnect them. Even if you’ve the habit of leaving your computer running overnight, don’t risk it as you might leave your confidential files open to access. You simply don’t want others getting into your stuff while you sleep?
- Before putting your computer to sleep, disconnect them. This is useful for both hibernation and suspend features that are typically used with laptops but can also be used along with PCs as well.
- Disconnect them before allowing anyone else to work on your PC. Make sure to disconnect them while moving through a border, a security checkpoint etc.
- Before inserting an untrusted USB drive, disconnect them to make sure those external drives (may or may not contain virus) do not put any threat on your data.
What’s to note?
Encryption by far, doesn’t really have much competition in terms of security standards as they have set their benchmarks so high, it is hard to achieve or even tackle. But as mentioned above, know that built-in encryption is not the one we’re praising here as our experience only relates to the top external encryption software, data security tools, and other encryption programs.