<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=40521&amp;fmt=gif">
phone20512-472-6000 Remote Support FacebookTwitterLinked InGoogle Plus
Posted by Matt Rohler | March 30, 2017

Endpoint encryption: It’s no longer undecipherable

3302017.png

In this day and age, most people have heard of encryption, and you may have even used it without realizing. For example, have you ever noticed that the standard “http” part of a web address now typically says “https”? That “S” stands for “Secure Sockets Layer,” which provides the online encryption standard used between your browser and a web server. In addition to SSL, there’s another type of encryption business owners and users should know about: endpoint encryption.

Why is endpoint encryption important?

First off, let’s define the word “endpoint.” An endpoint could be your mobile phone, tablet or laptop/desktop computer – wherever you store your data. All of us have a tremendous amount of personal and business information on our electronic devices. Regardless of your electronic device preference, all endpoints should be encrypted to make it as difficult as possible for cybercriminals to gain access to your company’s valuable digital information.

As a managed services provider, I like to explain to people the importance of endpoint encryption using my own approach home security. I have been updating my family’s digital security for the last 6 months for the same reason we lock our doors, have a gated driveway and employ security cameras.

CyberSecurityInfographic.png

Not enabling encryption on your devices is like putting a note on your front door saying you are on vacation and the door is unlocked, cameras turned off and gate open, which is why MyITpros has partnered with Beachhead Solutions to provide an easily managed encryption program for our clients.

How does MyITpros do endpoint encryption?

Utilizing features that are now available in most operating systems, Beachhead allows us to centrally manage encryption across multiple platforms. This centralized management gives visibility into your compliance, offers flexibility of deployment and, most importantly, ensures your data will remain secured if your devices are lost or stolen. After the agent software is rolled out to all the endpoints in your business, specific policies are implemented to ensure each device has been encrypted, the keys are registered and backed up, and the security has been verified. Once this occurs, unauthorized use or data access will be prevented with lockout polices that are time- or logon-based.  

For years, you’ve heard IT mantras such as “Back up your data,” “Update your software and operating systems” and “Ensure you run up-to-date anti-virus programs.” Now, you need to add “Enable encryption on all devices” to that list!

Matt_Rohler_Director_of_Operations.png Matt Rohler, Director of Operations 

The purpose of this blog is to answer the questions you ask! Please feel free to contact us for more information about our encryption services. You can also check out our encryption infographic for some more interesting facts!

Tags » business security