Data Encryption

  • Introduction

    What Is Data Encryption?

    Data encryption scrambles data so that it's unreadable to anyone without the correct decryption key or password. Modern IT technology now has the ability to encrypt data built into most products, which includes IT hardware and IT software. If your business is using business grade IT equipment and software, then it will have the ability to encrypt the data stored within without the need for any third party applications.

    Data encryption can also be applied to data when in transit, such as traversing a network or as email.

  • The solution

    Data Encryption Solutions Depend On What Data You Need To Protect

    Data encryption is one of the most effective ways to protect data and one of the most effective computer security solutions, the data cannot be accessed without the encryption key. Data encryption could be as simple as a password protected document or ZIP file, it doesn’t have to be complicated, just effective. For data management and complianceGDPR includes data encryption for IT security and personal data protection measures.

    Email can conform to various data encryption standards and there are multiple solutions available, such as PGP with public key sharing and identity-based encryption which is a hosted solution and uses the recipients email address as a key but stores the data on a platform hosted by the encryption provider.

  • Our approach

    How We Can Help You Implement Solid Dat Encryption Management

    Our preferred choice is Microsoft Windows BitLocker which is built in. This typically relies on a Trusted Platform Module (TPM) chip built into the hardware however there are alternate options such as USB key to allow IT systems without a TPM chip to still be encrypted when stored on the local disk. For Apple customers we use FileVault which is built into OSX to protect data stored locally on a Mac.

    The Silver Cloud Business, here in Salisbury Wiltshire, has many years of experience helping businesses in Wiltshire, Hampshire, Dorset and throughout the UK implement various types of data encryption and key management within their IT systems. Contact our business IT support engineers today to see how we can improve your data security.

Featured Case Study

  • Sector / Category 01

    Tech tip - Outlook - receive important notifications only

    If you would like Outlook to only alert you when important emails arrive, here is how to do it:

    This involves a custom alert rule being setup for specific people who you feel are important and want to be notified about, for example Customers, mangers or the big boss!

    To set up a custom alerting rule:

    • Open Outlook
    • Locate an email from the person you want an alert from
    • Right-click the email
    • Select Rules
      • Create Rule
      • Switch on the checkbox by the sender’s name
      • Choose “Display In The New Item Alert Window” and/or “Play A Selected Sound”
      • Choose the sound file to play for the alert
      • Click ‘OK’ to set the rule

    Repeat the process for the other contacts you would like to receive alerts for...

    To set up a custom rule for a whole domain:

    • Click the Home tab
    • click on Rules
    • Manage Rules & Alerts
    • Click “New Rule”
    • Select “Apply Rule On Messages I Receive” and click the “Next” button
    • Scroll down and select “With Specific Words In The Sender’s Address”
    • Click the underlined “Specific Words” (underlined)
    • Add the domain you need to receive alerts for ( then OK
    • The domain will replace “Specific Words”
    • Click “Next”
    • Choose whether you require a sound played, an alert displayed, or both
    • Click “Finish”
    • In “Rules and Alerts”, click “Apply” to turn on the rule
    • You will then get notifications if an email comes from the specific domian
    Tech tip - Outlook - receive important notifications only

The Silver Cloud Business Can Help Transform How Your Business Operates and Collaborates.

Contact us today for more information or advice about Data Encryption and how it can help benefit your business.