To businesses and individuals alike, cybersecurity remains a paramount concern. In today’s digital climate, there are many threats to data stored on laptop computers, remote servers, mobile devices, and portable storage media such as flash drives and external hard drives. One of the primary methods for securing stored data is encryption. Encryption can be applied granularly, such as to individual files or folders containing sensitive information, or broadly, to partitions or entire hard drives.

Storage encryption software typically requires users to provide a password or other authentication before encrypted data can be accessed. When the user opens encrypted files, saves new files, or performs other operations involving the hard drive, the encryption software transparently decrypts and encrypts the necessary files on the hard drive as needed.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]