From the course: Securing Your Home Office
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Encryption
- [Instructor] Just as we need to make sure hardware is difficult for unauthorized people to access, we can use encryption to protect data at rest, that is, when it's not being used, when the computer is powered off, or when a drive is unplugged or unmounted. Encrypting the system's boot disk and any other disks inside the computer will help to protect information in the case that the computer is stolen or lost. All major operating systems support this, and doing so is a security best practice. For company owned hardware, disk encryption should be configured by the IT department, not by individual users, for a variety of reasons. Usually the company will keep a decryption key in case a user forgets their password and is locked out of their account. And in some cases, the encryption needs to happen when the system is configured for the first time, and that's not something most users of corporately-owned computers will be…
Contents
-
-
-
Working at home3m 20s
-
(Locked)
Work versus personal4m 23s
-
(Locked)
Physical security for the home office3m 44s
-
(Locked)
Data security3m 30s
-
(Locked)
Encryption2m 50s
-
(Locked)
Backups3m 13s
-
(Locked)
Wi-Fi and network security3m 3s
-
(Locked)
Understanding VPN3m 43s
-
(Locked)
Browsing the web securely5m 7s
-
(Locked)
Audio and video privacy5m 40s
-
(Locked)
Maintaining your system4m 37s
-
(Locked)
Mobile device security2m 44s
-
(Locked)
Scams targeting home workers2m 17s
-
-