When it comes to computers and the average end user, encryption typically involves two completely different usages. Let’s start with what is encryption? Encryption is the process of converting ordinary programming coding or data to a “secret” code that you need the encryption key in order to decipher the content.
- Link to more involved definition: https://cloud.google.com/learn/what-is-encryption
So the two forms that most end users deal with is sending/receiving data and hard drive security. Let’s start with the sending and receiving of data. The most common forms are email encryption and virtual privacy network (VPN) tunnels. Email encryption is an “add on” provided by your email service that scrambles the data of an email so it cannot be read or opened unless the receiver has the key. The key is tied to unique user identifiers to prevent just a random person from opening/reading the email. A VPN is used to create a virtual “wall” of encryption around your data as it travels through the internet. If you think of the internet as a highway system with various exit ramps for different website addresses, then a VPN is a tunnel around your lane in the highway that prevents anyone from looking in your windows and prevents you from exiting off at the wrong ramp. VPNs are typically used by business to employee connections, financial transactions, or people who simply don’t want anyone to know where they are from and where they are going!
Hard drive encryption (sometimes referred to as endpoint encryption) is where the entire hard drive of a computer needs a key by each program in order for it to access data or perform functions on the hard drive. This is VERY useful if someone is wanting more security than just a password. Think of it as having additional security behind the lock on the front door. The concern with hard drive encryption is it prevents some forms of IT support when you are having technical issues with your hard drive or software. It is REALLY important to ensure you have the hard drive backed up to a 3rd party location because quite often the only fix available with an encrypted hard drive is to “flatten and reload”. It is quite frequently what various malware/hackers do to hold your data hostage. They will “encrypt” the hard drive and then only give you the key if you pay a ransom (and sometimes not even then). Really essential that you don’t give permission to any application to encrypt your computer unless you really want it encrypted and have access to the associated key.
Using encryption on your computer is a great way to enhance the security already being provided by your firewall and antivirus services….especially for the transmission of data. Just keep in mind the trade-offs for maintenance and repair, or even the forwarding of an email to someone else.
