{"id":1889,"date":"2013-05-22T12:01:31","date_gmt":"2013-05-22T16:01:31","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1889"},"modified":"2020-12-25T20:54:19","modified_gmt":"2020-12-25T16:54:19","slug":"encrypt-your-data","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/encrypt-your-data\/1889\/","title":{"rendered":"Reasons to Encrypt Your Data"},"content":{"rendered":"<p>Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private \u2013 through encryption. For a long time strong encryption was only available to governments, but now it can be used by any user. More importantly, even if you never considered it before, <b>you always have secrets worth encrypting<\/b>.<\/p>\n<p><b>Something to hide<\/b><br>\nWhen discussions regarding encryption and protection start people often say, \u201cI have no secrets, nothing to hide.\u201d However, typically they mean, \u201cI believe no one will bother to dig into my smartphone or laptop to find something valuable.\u201d<\/p>\n<p>But it turns out that such hopes are not likely true. A document saved on a home PC desktop or a cell phone left in a living room could quickly become an object of examination for those around you. Are you ready to show <b>all<\/b> your letters, photos and documents to your wife, brother or kids? Maybe there is nothing bad saved, but you still may not be willing to share. Are you ready to tell your credit card number and PIN code to your teenage children? Give away your Gmail or Facebook password to your sister? Show <b>all<\/b> your family photos to your friends, who may be visiting your house and borrowing your PC for 15 minutes?<\/p>\n<p>Do you really want to explain to your wife that Natasha is a colleague from another department of the company you work for and the \u201cmeeting tomorrow\u201d you\u2019re discussing is really a business meeting with ten participants?<\/p>\n<p>Of course, a story could become even more embarrassing if a malicious application manages to infect your computer. A recent trend in the cybercriminal world is a malware that can steal all potentially valuable information from your computer: documents, photos, passwords, saved in a web browser \u2013 everything.<\/p>\n<p>Stolen images often contain document scans, i.e. a photo of your drivers license and other important papers potentially useful in fraud and identity theft. There have even been cases when stolen images with saucy photos <a href=\"https:\/\/me-en.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/\" target=\"_blank\" rel=\"noopener\">were used for blackmail<\/a>.<\/p>\n<p>Another new disaster for users is a forgotten smartphone. As this type of phone is typically full of valuable private information, some \u201cadvanced\u201d thieves not only resell these stolen devices, but scan their memory in search of useful data like passwords and mobile banking codes\/apps.<\/p>\n<div class=\"pullquote\">Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.<\/div>\n<p><b>One answer for all troubles<\/b><br>\nThere are a lot of threats to your information, but it\u2019s possible to develop protections for each like by isolating your home PC from strangers and minors and using a PIN on your phone lock screen, etc.<\/p>\n<p>There is also a more versatile way \u2013 to make information readable only by a legitimate owner. All those awkward moments and mishaps might be avoided if private information is stored in an encrypted form.<\/p>\n<p>You encounter encryption even when you don\u2019t think about it when you\u2019re checking Gmail or banking via HTTPS or calling your friend using a popular GSM cellular network. But we want to concentrate on another important aspect \u2013 encrypting the data stored on your computer or smartphone.<\/p>\n<p><b>What is encryption<\/b><br>\nEncryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form though. There are a lot of popular encryption\/decryption methods, but the key to security is not a proprietary algorithm. The most important thing is keeping the encryption key (password) a secret so only trusted parties know it.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113630\/pure.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1892\" alt=\"pure\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113630\/pure.png\" width=\"568\" height=\"405\"><\/a><\/p>\n<p><i>It is important to distinguish encoding from encryption. Encoding also transforms information, but it\u2019s typically performed for the convenience of storage or transmission, not keeping secrets. Widely known encoding methods are Morse code and binary encoding for computer storage.<\/i><\/p>\n<p><b>Your digital locker<\/b><br>\nThe most convenient solution to keeping files encrypted is the creation of an encrypted vault, also known as a container. When mounted, it\u2019s visible in the system as a separate disk drive. You can save or copy any files on it and use it just like your USB stick. The important difference is that a physical container is a big file on your hard drive, and you access it via special software like <a href=\"https:\/\/www.kaspersky.com\/pure\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky PURE<\/a>.\u00a0 Any file you save to this special drive will be encrypted \u201con the fly\u201d and saved to one big container file.<\/p>\n<p>Any person that has access to your PC can see and even steal (copy) a container file, but it won\u2019t really help the thief to access your information. Only random characters are inside this file and it can take years to find the password able to transform this file full of garbage to a disk with readable files.<\/p>\n<p>Of course, you have to follow some simple rules to make an encrypted container an effective protection:<\/p>\n<p>* Your encryption key (password) is the only protection against others. You have to make it long, complicated and hard to guess<a href=\"https:\/\/me-en.kaspersky.com\/blog\/securing-your-passwords-with-pure-3-0\/\" target=\"_blank\" rel=\"noopener\">. Here are our tips on making good password<\/a>.<\/p>\n<p>* You have to store all your private information on the encrypted drive.<\/p>\n<p>* Any person that knows the password can read all files stored. If you have different types of information and want to make it accessible to different users, you can create multiple containers with different passwords.<\/p>\n<p>* This is very important! Don\u2019t keep your encrypted drive mounted. If you do, anyone can steal your files as if they are from an ordinary disk. Mount your encrypted drive only when working with important data and dismount immediately after finishing your job.<\/p>\n<p>* If a container file is somehow damaged, all files stored will be lost. That\u2019s why it\u2019s important to <a href=\"https:\/\/me-en.kaspersky.com\/blog\/call-for-backup\/\" target=\"_blank\" rel=\"noopener\">backup<\/a> container files often.<\/p>\n<p>* Use total protection of your computer \u2013 we suggest <a href=\"https:\/\/www.kaspersky.com\/pure\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky PURE<\/a> \u2013 to protect your encryption password from trojans and <a href=\"https:\/\/me-en.kaspersky.com\/blog\/keylogger\/\" target=\"_blank\" rel=\"noopener\">keyloggers<\/a>. An active keylogger diminishes your encryption efforts.<\/p>\n<p><b>Smartphone safety<\/b><br>\nIn trying to protect users data from smartphone theft, mobile OS vendors have developed encryption functions. Important information is kept in an encrypted form and is decrypted each time a user inputs his PIN to unlock his device. Apple doesn\u2019t allow users to manipulate encryption settings, but a lot of information is encrypted when you activate the <a href=\"http:\/\/support.apple.com\/kb\/HT4175\" target=\"_blank\" rel=\"noopener nofollow\">passcode protection<\/a>. There is a <a href=\"http:\/\/source.android.com\/tech\/encryption\/android_crypto_implementation.html\" target=\"_blank\" rel=\"noopener nofollow\">full content encryption<\/a> option in the Android security settings, and it makes all user data inaccessible without a password. To ensure maximum protection we recommend using recent versions of mobile OS \u2013 iOS 6.1+ and Android 4.1+.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113629\/android.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1893 alignnone\" alt=\"android\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113629\/android.png\" width=\"194\" height=\"280\"><\/a>\u00a0 \u00a0\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113628\/android-settings.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1894\" alt=\"android settings\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113628\/android-settings.png\" width=\"155\" height=\"277\"><\/a><\/p>\n<p><b>Cloud protection<\/b><br>\nThere is one type of information that desperately needs to be encrypted: your passwords. You have to use a unique and strong password for each site and service, but it\u2019s complicated to memorize all of them. The solution is using a special password storage application, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/securing-your-passwords-with-pure-3-0\/\" target=\"_blank\" rel=\"noopener\">called digital wallets<\/a>, which constantly keep your password database encrypted.<\/p>\n<p>Strong encryption allows the safe transmission of this database to the Internet and syncs it between different computers and mobile devices. Cloud services of this kind allow you to keep all of your passwords handy without sacrificing security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private \u2013 through encryption. For a long time strong encryption was only<\/p>\n","protected":false},"author":32,"featured_media":1890,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[189,261],"class_list":{"0":"post-1889","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-data-security","9":"tag-encryption"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/encrypt-your-data\/1889\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/encrypt-your-data\/1889\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/encrypt-your-data\/1889\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/encrypt-your-data\/1889\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/encrypt-your-data\/1889\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/encrypt-your-data\/1889\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/encrypt-your-data\/1889\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/data-security\/","name":"data security"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1889"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1889\/revisions"}],"predecessor-version":[{"id":17860,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1889\/revisions\/17860"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1890"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}