Encrypt Everything | Risky Business Ep 03
Encrypt Everything: Video
Mick Grove: Encrypt your own data. For one example, there was a physical break-in in Seattle, and the attackers took an old laptop that wasn’t encrypted and they used that to remotely access other systems because it had access to the VPN credentials. They were able to add themselves to the payroll system, and for a while, they were getting paid.
Dan Carroll: That’s insane.
Mick Grove: Because they didn’t have a good oversight and they had secret information on these laptops. So if you just encrypt your laptop which is built into windows, it’s built into MacOS, its called BitLocker on windows.
Dan Carroll: Mine has a 7 letter password that I have to type in every time my computer comes on.
Mick Grove: Well you don’t even have to enable the password if you don’t want.
Believe in incredibly accessible business?
Get the Gravity newsletter for FAQs, tools, and camaraderie.
Dan Carroll: Well tell that to IT downstairs.
Mick Grove: It is best to use a password because if someone takes it, they can’t do anything with it. It is rendered useless to them.
This post is part of our “Risky Business” series on online security tips for businesses.