Summary In daily life, we often use computers and USB mobile hard drives to save or send some important files. However, people often do not encrypt these important files. It is precisely because of people's lack of security awareness that information leakage incidents have occurred frequently in recent years. In the past people's cognition, encrypting files is too cumbersome, which is why many people are unwilling to encrypt files. In fact, encrypting information is not difficult. The following article will introduce to you a simple and effective file encryption method.
I. Introduction and analysis of leakage incidents in recent years
• Information disclosure vulnerabilities exist in Huawei PCManager versions earlier than 9.0.1.66 (overseas regions) and versions earlier than 9.0.1.70 (China regions). Attackers can use this vulnerability to read and write information, so many Huawei users have caused privacy leakage due to this vulnerability.
• On August 28, 2018, the sale of occupancy information and data of multiple hotel chains under Huazhu suddenly appeared on the Internet, which aroused widespread concern from users. After all, the data involved 500 million pieces of user personal information and occupancy records, and these The leaked data contains a lot of private information, such as ID number, home address, bank card number and so on.
• In 2018, Amazon employees used intermediaries to sell internal data and other confidential information to third-party merchants, thereby building an advantage for those merchants who bought the data.
• In October 2019, Cathay Pacific issued an announcement announcing that approximately 9.4 million passenger data had been accessed without authorization, including passenger names, nationalities, dates of birth, phone numbers, etc., as well as 0.86 million passport numbers, 24.5 million Hong Kong identity card numbers.
• On June 16, 2018, someone began to sell user information of the recruitment website 51job.com (51job.com, NASDAQ:JOBS) on the dark web, which involved 1.95 million user resumes. Later, 51job confirmed that some user account passwords had been hacked. Hit library. In order to confirm the authenticity of the leaked data, 51job also conducted certain tests and found that the information is true and reliable.
Whether it is being hacked or being sold user information by employees, the cause of these cases is that the data has not been encrypted to a certain extent. If the company performs certain processing on these data or files (for example: encryption or locking, etc.), Then the occurrence of such leakage events can be avoided to the greatest extent.
II. Reasons and countermeasures for file information leakage on the computer
In recent years, many companies like to save some company’s confidential files on the computer, but because these files are not encrypted, the leakage of the files has caused heavy losses to the company. In addition to companies, many users like to put personal information files on the computer, but the files are not protected, so the files are illegally stolen by others. It is not difficult to completely solve the file leakage problem caused by these two reasons, we only need to use - Renee SecureSilo This software can easily solve the problem of computer file leakage.
Renee Secure Silo is one of the most widely used encryption software in the market. The biggest advantage of using this software for encryption is its convenience and security. The user creates a private disk and puts the files to be protected on the private disk to protect the files.
Easy to modify – The software adopts the method of creating a virtual disk for encryption. When using it, create a virtual disk, put files in it, and close the virtual disk when it is not needed. The operation is very convenient. Moreover, unlike encrypted compressed files such as RAR/ZIP/7ZIP, modifying the files in the SecureSilo virtual disk does not require a long wait, and the modified or newly added files can be saved in less than a second.
Good security – due to the private format of the virtual disk, and the use of advanced AES256 encryption technology. There is no universal cracking program available on the market.
Renee SecureSilo – Encrypt Confidential Data
Encrypt files in seconds Encrypt files with virtual encrypted disk and whole process can be finished in 1 second.
User friendly Concise interface helps users master the software in short time.
Let’s take a look at the specific operation steps of the software:
1. Download and install Renee SecureSilo.
2. After the download is complete, open the software, and set a login password for the software in the pop-up interface. (You will need to enter a password each time you log in).
3. Click on the encrypted file and select “Create Private Disk” to create a virtual disk.
4. After creating the virtual disk, set an open password for the virtual disk.
5. After setting the password, select the size range of the disk, then click “Next” and wait for the encryption to complete.
6. The user puts the files to be encrypted into the created virtual disk, and then closes the private disk to complete the locking.
7. The user only needs to enter the password to open the private disk. After the virtual disk is opened, you can see screenshots of various files in the windows file browser.
8. If the user needs to delete the private disk, then open the software, select the private disk in the encrypted file interface, then click “Edit Private Disk”, then select “Delete”, select “Yes” in the pop-up prompt box, and then ” Enter the password” and that’s it.
III. Causes and countermeasures of information leakage in remote information transmission
In addition to the information leakage of the files we store on the computer, if we do not encrypt the transmitted files when we transmit the remote information, the information will also be read and identified by others, and the information will be stolen. So is this phenomenon unavoidable? The answer is no, here we will introduce two professional software for you, so that you can safely transfer information files remotely.
(1) Renee File Protector
Renee File Protector It is one of the most popular and professional file encryption software on the market. Use this software to encrypt emails. This software encrypts files in gfl format or exe format. With the help of this software, the user can encrypt the files that need to be transmitted remotely, so as to realize safe transmission and avoid information leakage during transmission. (However, you need to pay attention to using this software to encrypt emails: if the encryption is in gfl format, then the party receiving the email also needs to download a Renee File Protector to decrypt it. It is not necessary to encrypt it in exe format.)
Renee File Protector - Overall Protection to Your Data
Easy to use Few clicks for whole folder encryption process.
Overall protection Users can hide, lock or get other protection to files in local disk or USB disk.
High Security Classified encryption method prevents data from leakage.
Compression transfer Support to compress and encrypt any files to secure the file transfer security.
Advanced self protection Provide self
Easy to use Few clicks for whole folder encryption process.
Overall protection Users can hide, lock or get other protection to files in local disk or USB disk.
High Security Classified encryption method prevents data from leakage.
Here is a brief introduction to how the software works:
1. Download and install Renee File Protector.
2. Set a login password for the software.
3. After entering the software, click “File Encryption”.
4. Then select “Add File” or “Add Folder” according to your actual needs (this article takes adding a file as an example).
5. Then select the format you want to encrypt. (The gfl format is more secure, and the decryption method of the exe format is simple). This article takes the encryption as an example in the gfl format.
6. Then select the save path of the gfl file.
7. Set a password for the gfl file.
8. Then find the file on the desktop, right-click the file, and select “Send to”, and then select “Email”.
(2) Renee SecureSilo
Renee SecureSilo is a professional software for encrypting files. This software is very suitable for our daily use. In addition to the encryption and protection of local files with the help of this software described above, we can also use this software to protect our needs. Files that are sent remotely are protected. The following is a detailed introduction to the operation steps:
1. Download and install Renee SecureSilo.
Renee SecureSilo – Encrypt Confidential Data
Encrypt files in seconds Encrypt files with virtual encrypted disk and whole process can be finished in 1 second.
User friendly Concise interface helps users master the software in short time.
2. After the download is complete, open the software, and set a login password for the software in the pop-up interface.
3. After entering the software, click “Protect USB”, and then select “Protect Email Attachments”.
4. Then click “Add” and choose to add files or folders. (This article takes adding files as an example).
5. After selecting the file, click Next.
6. Set the zip path, set a password, and click Next.
7. Then click “Send Email”.
IV. Reasons and Countermeasures for File Leakage in USB Mobile Hard Disk
In addition to the two major types of file leakage reasons described above, files saved to USB mobile hard disks will also leak file information. The files we save to the USB mobile hard disk are likely to be illegally stolen or illegally printed during the process of taking out the data. Here is a professional software to protect the files in the USB mobile hard disk —— Renee USB Block. Renee USB Block is one of the most popular USB protection software on the market, the following will introduce the specific operation steps for you.
Renee USB Block – Safe and Effective Solution to Protecting USB Port
Easily use Simple operations fit green hands and professionals.
Prevent from privacy leak Unauthorized external devices cannot run or obtain any information in PC.
Control and lock Users can lock devices, websites, applications and USB ports.
Monitor and logs Users can select the target directory to monitor and generate the history.
Self protection Lock itself if users enter the wrong passwords 5 times. Notification will be sent once wrong password entered over 5 times and password change. Password is also necessary when uninstalling.
Easily use Simple operations fit green hands and professionals.
Prevent from privacy leak Unauthorized external devices cannot run or obtain any information in PC.
Monitor and logs Monitor target directory and generate the history.
2. After the download is complete, open the software, and set a login password for the software in the pop-up interface.
3. Connect the USB mobile device to the computer, and then add a whitelist in the “USB & disc lock” of the “Control Center”. (After adding the whitelist, you can prohibit non-whitelisted external storage devices from stealing files)
4. Check the “Disable printer” option in the “Device Lock” of the control center to prevent the files in the USB mobile device from being illegally printed.
5. In the control center, select “Website Lock” to add websites that restrict browsing to prevent files from being stolen illegally.