Implementing encryption in your cyber security policy.

Implementing encryption in your cyber security policy.

Encryption on both computers and mobile devices in your business is a crucial step to securing not only your technology but also the data contained in your business.

In this article, we are going to highlight some of the basic steps to implement encryption across your company.

As a bonus, we will also disclose an efficiency hack to perform device encryption with just two clicks of the mouse!


Laptops & Computers

Newer Windows-based systems have a feature called BitLocker. This service allows you to encrypt the whole storage area of your system.

Beware! By default this service many not be enabled and you should seek professional advice.

Windows LaptopWe’ve seen many businesses who have enabled BitLocker and then lost access to their computer systems.

Any professional IT services firm will be able to setup BitLocker device encryption system-wide using either remote management software or with a Windows Server BitLocker encryption policy.


Mobile Device Encryption

Many mobile and smart phones now come with encryption as standard, however this is not always the case.

Worse still, most devices are configured with minimal security measures needed to access them.

You can quite easily disable PIN codes and passwords on a mobile device. By doing so, any form of encryption the device has is useless.

Phone SecurityThis is why we always suggest you implement “mobile device management” (MDM) on company devices.

Once the MDM software is installed you can easily enforce security on devices with only a couple of clicks. This includes encryption, strong pass-code requirements and fingerprint ID where necessary.

Mobile Device Management (MDM) also allows you to deploy new business apps without the need to performing a manual install on each device separately.


Other Devices such as USB Keys

We’ve covered both PCs and mobile devices, but what about other devices that might hold valuable company data?

What do you do to secure those?

The most common is the USB key. These are extremely handy and practical for many purposes, but the disadvantage with these devices is that they can easily be lost or get into the wrong hands.

Many organisations outlaw USB storage devices completely and block the use of them on their systems as they can also be used to transport viruses.

USB Stick

However, not everyone wants to give them up that easily and we always suggest purchasing USB storage devices with some form of encryption on them.

Many devices now come with software encryption.  When you plug them into your system you’ll be asked for the password before you can open the files.

Some devices even have a PIN keypad physically on the device.

No matter what the choice it’s worth encrypting all data that ends up on these devices.

    Setting Up Encryption on your Devices

    If you would like help setting up encryption on your computers, phones or servers, please call us on 1300 991 030 or complete the form below.

    Quick Enquiry

      Describe your issue below or call 1300 991 030 and we will respond within 30 minutes.