Encryption matters: Secure your devices today
Devices are replaceable; personal or private information is not.
Encryption is a method of preventing unauthorized access to electronic data. It is used to protect data on devices such as computers, laptops, cellphones, or USB sticks. It has become even more important the more portable devices we carry with us that can be misplaced, lost or stolen.
Encryption can also be used to protect data during transmission. For example, after you enter your credit card details to purchase something online, your computer automatically encrypts that data so that others cannot steal this information when it is transmitted over the internet.
Encryption is imperative for sending sensitive information, securing your documents, keeping your email private – in your personal as well as professional life.
What happens when I encrypt my devices?
Encryption is the process of scrambling information, making it unreadable in order to protect it from unauthorized access. When information is encrypted, you need a password to make it readable again. Encrypting your computer and mobile devices is the most effective way to keep your personal information as well as that of your friends and client data secure.
Security breaches can cause a lot of wasted time, money, and stress, and can harm a company’s reputation and the need for compliance requirements. But, in the event that your device is misplaced, lost or stolen, encrypted data will be unreadable without a password.
What is 256 bit encryption?
The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. Its successful use by the U.S. government led to widespread use in the private sector, leading AES to become the most popular algorithm used in symmetric key cryptography.
It is used in many protocols such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS) and can be found in most modern applications and devices that need encryption functionality. In theory, it cannot be cracked since the combinations of keys are massive. 256-bit encryption refers to the key length of the symmetric encryption technology. It means that the key is made of 256 binaries (zeroes and ones) and there are 2256 possible combinations. Feeling safe yet?
Technology that keeps your data safe
Talking about the hard facts of encryption might sound confusing or overwhelming, but it does not need to be complicated. Choose trusted brands and make sure you base your purchasing decisions for devices where data security matters on information about the available security features on the device or any software that comes with it.
Dictation and Security
The Philips Digital Pocket Memo voice recorder series, for example, is capable of protecting recorded dictations using both device and file level security features that help users meet security regulation standards.
What is device level security?
- Device lock with PIN Code: The recorder can be set with a 4 digit PIN to unlock before use and allows for a configurable inactivity time-out period that requires PIN upon re-entry.
- User Identification via PIN Code: In situations where the Philips Digital Pocket Memo recorder is shared between multiple users, each author can be given a unique PIN that will not only unlock the device, but assign the correct author name to the dictation automatically. This eliminates the need for sharing PINs among multiple users and grants authorization only to the authors own recordings. Assuring that the proper author name is attached to the dictation file can also assist in file tracking and auditing processes.
What is file level security?
- Real Time Advanced File Encryption: Philips uses the DSS Pro file format (Digital Speech Standard) for professional dictation files to allow for real time file encryption in .ds2 format with Advanced Encryption Standard (AES) with 256 bits.
- Other file encryption options: With DSS Pro encryption, more security can be achieved over the standard SpeechExec encryption method. DSS Pro encryption can be selected automatically or manually prior to starting a new recording, while standard SpeechExec encryption is possible even after a recording has been created. While only one encryption method can be used on a file, having two options for security provides more flexibility to ensure files are secure.
Using secure file formats and making sure the encryption process is not broken from dictation to transcription and the final document, will make sure your own and your client data stays safe.
Want to know more? Leave us a comment.