Do your kids examine every gift under the tree, shaking and trying to guess what’s enclosed within?

My mom used various codes to prevent us from knowing which ones were ours. It varied between numbers, letters and symbols, and each year it was a different method that only she knew.

In Junior High, we used numbers or symbols to write letters so that if someone else found our letters, they wouldn’t know who our latest crush might be or what we thought about the latest gossip going around the school. That was important stuff; we didn’t want everyone to know our secrets! However, it all depended on a code that told both the writer and reader what substitutions had been made.  It is knowing that in one case an “A” might mean a “J”, but in another case, it might mean a number.

This is an example of how we use encryption every day in our lives.  We hear about data encryption, but do we understand its importance?  I was recently asked “what exactly is data encryption?”. The general definition is the process of translating data into another form, or code, so that only people with access to a secret key or password can read it.

Encryption is more important than just Junior High secrets; it’s the basics that keeps our passwords, bank information, and other personal data secured.  It is what gives us the peace of mind to do online banking or check our email.  But is it always in place? When your phone connects to an unsecured Wi-Fi, that means that no encryption is being used when transmitting data.

Free Wi-Fi is common these days. You can find it at our local coffee shop, the local restaurant, and even my auto repair shop. Any place where we might be asked to wait and “kill time”. It seems like a great thing, not using your cellular data plan to update Social Media.  But how about checking your bank balance before you pay for that auto repair? Encryption is what gives us peace of mind, but it’s not present when using unsecured Wi-Fi.

If you find yourself using free, unsecured Wi-Fi for activities needing your password, please talk with us about ways we can help secure your data.

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today.
 

Recent Blog Posts

Top 4 Data Backup Devices for Small Business

Top 4 Data Backup Devices for Small Business

You already know you need good, regular backups of all of your business data, but you may get stuck figuring out the best way to manage them. Fortunately, you don't need to spend a scary amount of money to buy and set up a reliable backup system.  Let’s look at a...

read more
IT Disaster Recovery Plan: A Simple Guide

IT Disaster Recovery Plan: A Simple Guide

Imagine this: your business is running smoothly, customers are happy, and everything seems to be on track. Then, out of nowhere, a disaster strikes—maybe it's a cyberattack, a natural disaster, or even a simple hardware failure. Suddenly, your IT systems are down, and...

read more

Get In Touch

 
Techno Advantage

317-857-0150

Pin It on Pinterest

Share This