No excuses -- encrypt all laptops

No more excuses: If you're not encrypting laptops, you are not applying due diligence.

Every year, more than 5,000 laptops are lost in taxis in London, New York, Chicago and other large cities. According to our research, in 2008 companies' topmost security investment was laptop encryption. Laptop hard drives are getting bigger and now can hold hundreds of thousand to hundreds of millions of sensitive records.

As a CSO, one of your top priorities is probably to keep your company off the front page of the news. Is it inexcusable to have laptops in the field with unencrypted hard drives? With such new open source solutions as TrueCrypt, there are few excuses left: All laptops must be fully encrypted.

Encryption technology is easy, but encryption solutions are hard. Key management and recovery make it difficult to manage large-scale encryption. Even low-cost encryption software for laptops can add up quite quickly if you deploy it on all laptops. Even if you can afford the cost of the software, however, you have to look at the complexity of the whole solutions

TrueCrypt, an open source encryption solution now offers cross-platform (Windows, Mac, Linux), whole-disk encryption that is surprisingly easy to deploy and use. The software is slick, both in the initial installation and disk encryption and in its daily use. It's unobtrusive, has no noticeable impact on performance and requires almost no user training. Furthermore, it is free to use and free to modify. Even the smallest companies now have few excuses for not deploying whole-drive laptop encryption.

As with any offering, the challenge is recovery from a disk failure or password loss. TrueCrypt will create rescue CDs that can be used to recover from corrupted data and boot blocks. In addition, the rescue CD can be protected with a master administrator pass-phrase that is independent from the user pass-phrase. So, users can change passwords and administrators can still recover disks without knowing the user pass-phrase. Rescue CDs can be carried by users (you still need the pass-phrase to use the rescue CD) and also stored in a central location (a fireproof, locked safe).

Although data can be salvaged from an unencrypted drive even after heavy corruption, encrypted disks can become irrevocably corrupted. I would recommend combining TrueCrypt with a good backup solution, preferably an online (over-the-network) backup solution so as to be protected from data loss.

For those not moving to Windows Vista (which has built-in whole-disk encryption), TrueCrypt offers a cost-effective, efficient and very secure solution. Encryption provides not only the most cost-effective "data leak" protection but also a safe haven from breach disclosure. No more excuses: If you're not encrypting laptops, you are not applying due diligence.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andreas M. Antonopoulos

Network World

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?