![]() Instructions can be found in the list below. The information security team recommends using Windows 7.zip to create an encrypted archive. You want to encrypt several files or a folder occasionally and save this state for yourself or others: Again, there are several options to manually encrypt multiple files or a folder.You can find instructions in the list below. The information security team recommends the open-source solution 7.zip for Windows. This is recommended when you also want to encrypt files of a different type or even entire folders. Alternatively, you can use a special encryption program. This is suitable if you occasionally want to encrypt a file from this application area. For a collection of links to instructions on how to do this, see External Help Pages. The classic office programs Word, Excel, Acrobat offer the possibility to save encrypted files. by email, store them in the cloud, protect the content from admins. You want to encrypt single files or file folders once or occasionally to send them e.g. ![]() The following areas of application can be distinguished: Of the software presented here, only the paid software Boxcryptor Enterprise supports a common key management for groups. Consider in advance whether you only want to encrypt your own data or whether you want to work in a group with encrypted data and corresponding keys. If other people are to have legitimate access to your encrypted data, they need your key.You must therefore store your keys very well. The loss of the key means the loss of the data, because without the key, the data can usually not be recovered. Once encrypted, data can only be decrypted with the corresponding password or certificate. These are usually passwords or certificates. To encrypt data, electronic keys are required, which are used to encrypt and decrypt data.Consider in advance whether you work with confidential data only occasionally and need encryption only occasionally or work with confidential data often to very often. Encrypting data is an additional effort that costs resources (your time, system resources, possibly additional software, and financial resources).What do I have to consider when encrypting data? For further and more detailed information, refer to the article Keeping your data secure as well as the sciebo policy (german) and the overview about data classes and their required protection (german). ![]() It is mandatory for handling personal data on local terminals or shared storage areas (network or cloud storage).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |