Phone and laptop encryption guide: Protect your stuff and yourself

The worst thing about having a phone or laptop stolen isn’t necessarily the loss of the physical object itself, though there’s no question that that part sucks. It’s the amount of damage control you have to do afterward. Calling your phone company to get SIMs deactivated, changing all of your account passwords, and maybe even canceling credit cards are all good ideas, and they’re just the tip of the iceberg.

Using strong PINs or passwords and various Find My Phone features is a good place to start if you’d like to limit the amount of cleanup you need to do, but in this day and age it’s a good idea to encrypt your device’s local storage if at all possible. Full-disk or full-device encryption (that is, encrypting everything on your drive, rather than a specific folder or user profile) isn’t yet a default feature across the board, but most of the major desktop and mobile OSes support it in some fashion. In case you’ve never considered it before, here’s what you need to know.

Why encrypt?

Even if you normally protect your user account with a decent password, that doesn’t truly protect your data if someone decides to swipe your device. For many computers, the drive can simply be removed and plugged into another system, or the computer can be booted from an external drive and the data can be copied to that drive. Android phones and tablets can be booted into recovery mode and many of the files on the user partition can be accessed with freely available debug tools. And even if you totally wipe your drive, disk recovery software may still be able to read old files.

Encrypting your local storage makes all of that much more difficult, if not impossible. Anyone trying to access your data will need a key to actually mount the drive or read anything off of it, and if you wipe the drive the leftover data that can be read by that file recovery software will still be encrypted even if the new data on the drive isn’t.

There are a few downsides. If you yourself lose the key or if your drive becomes corrupted, for example, it might be more difficult or impossible to recover data. It can slow down performance, especially for devices with processors that don’t provide hardware acceleration for encrypting and decrypting data. But, by and large, the benefits outweigh the drawbacks, and the slowdown for modern devices should be tolerable-to-unnoticeable.

iOS: Don’t worry about it

As of iOS 8, as long as you set a passcode, your personal data gets encrypted. Apple’s security whitepaper (PDF) for iOS 8.3 and later specifically says that “key system apps, such as Messages, Mail, Calendar, Contacts, Photos, and Health data values use Data Protection by default, and third-party apps installed on iOS 7 or later receive this protection automatically.”

The company also claims that every current iDevice features “a dedicated AES 256 crypto engine built into the DMA path between the flash storage and main system memory,” which ought to limit the impact of this encryption on system speed.

OS X: FileVault

Phone and laptop encryption guide: Protect your stuff and yourself

Starting with OS X 10.7 (Lion) in 2011, Apple began supporting full-disk encryption with FileVault 2. In more recent OS X versions, some Macs even offer to encrypt your storage as part of the first-boot setup process, though it’s not the default as it is in iOS.

To encrypt your drive after the fact, go to the Security & Privacy pane in System Preferences, and select the FileVault tab. Click Turn On FileVault and you’ll be offered a pair of options: store the key used to unlock your disk somewhere yourself, or choose to store it in your iCloud account. A local recovery key keeps that key off of another company’s servers, but leaves you without recourse if you lose it and you’re locked out of your system. If you do store your key in iCloud (or even if you don’t, for that matter), we strongly recommend enabling two-factor authentication for your Apple ID.

Encrypting your disk doesn’t drastically change the way that OS X works—you just need to put your account password in to unlock the disk before the operating system boots instead of afterward. You’ll also need to specify which local users’ logins can decrypt the disk. Otherwise, just the account that enabled FileVault will be able to turn the machine on. If you ever need to decrypt your Mac, it’s pretty easy if you can log in to the computer or if you have the key available.

Generally speaking, performance for encrypted devices declines less for newer Macs with hardware acceleration—most Core i5s and i7s can do it, but Core 2 Duo Macs cannot.


Phone and laptop encryption guide: Protect your stuff and yourself

Despite past promises, new Android devices still aren’t being encrypted by default. Default encryption is an option for OEMs, but outside of Google’s Nexus devices few if any companies are choosing to enable the feature on their phones.

You can still encrypt any relatively modern version of Android pretty easily—these specific steps work for Nexus devices or anything running near-stock Android, but the process should be similar if your phone is using a skin.

Open the Settings app, go to Security, and then tap “encrypt phone” to get the process started. Your phone may ask you to plug it in or charge the battery to a specific level before it will give you the option to encrypt, mostly because interrupting this process at any point is likely to completely corrupt your data partition. You’ll need to protect your phone with some kind of PIN or pattern or password if you haven’t already, and as in OS X your phone will probably require it before the operating system will boot.

To confirm that your phone was encrypted, go to Settings and then Security and look for a small “Encrypted” badge under the “Encrypt phone” menu item. If your phone already says it’s encrypted, you may have one of the new post-Lollipop phones that came with encryption enabled out of the box.

Depending on your phone, encrypting your Android phone or tablet can significantly impact performance. This is the worst for older or slower devices, which can use slower flash memory and filesystems and lack hardware encryption acceleration. The experience is better on newer phones with 64-bit ARMv8 processors and higher-end, faster storage.

Additionally, if you need to decrypt the device later on, there’s no way to do it without wiping and resetting the phone. If your phone came encrypted out of the box, though, there’s no way to decrypt the device without making more extensive software modifications.

Finally, in Android Marshmallow, the Android phones that include external storage are able to encrypt and protect the data on those cards as well as on internal storage.

Encryption Software Best Folder Encryptor Updated to Version 16.81

The professinal file and folder encryption software – Best Folder Encryptor has been updated to version 16.81 recently. In this new version, we fixed some bugs and enhanced the efficiency and strength for flash encryption and hiding encryption.

Change Log of Best Folder Encryptor:

File Name: Best Folder Encryptor

Version: 16.81

File Size: 3.42MB

Category: Folder Encryption, File Encryption

Language: English

License: Trial version

System Requirements: Win xp/vista/Win 7/Win 8

Released on: Jun.27, 2015

Download Address:

What’s New in This Version:

– Fixed bug occurs when encrypting a file;

– Fixed  bug in password hint;

* Improved the prompt message shown in software activation window.

Encryption Software Best Folder Encryptor Updated to Version 16.81

Why Choose Best Folder Encryptor:

Best Folder Encryptor is a professional file and folder encryption software. This software features superfast with high security and confidentiality. With the internationally advanced encryption algorithms, encryption methods and file system drivers, the encrypted files and folders cannot be decrypted without the correct password, and are prevented from copy, deletion or removal.

It is convenient to open and edit the encrypted folder or file with the Open feature, and you don’t have to re-encrypt the folder or file after use.

Besides, it supports many powerful features such as data shredding (file/folder shredding), completely hiding hard drive partition, disabling USB storage devices or set them as read-only, etc. All these make Best Folder Encryptor undoubtedly a flawless encryption software and the best helper.


How Encryption Software Works in Enterprises’Data Leakage-proof?

For modern enterprises, the trend in information computerization’s development means the data is not only the assets, but is the reflection of enterprise’s core competitiveness. To make your enterprises remain invincible in the fierce business competition, you should protect the sensitive and key data of enterprise effectively. In reality, data leakage will lead to economic losses or even more troubles.

With the development of Internet, the boundary between Intranet and Extranet is becoming blurred because the Intranet and outside world have been linked closely by Email and IMs. Traditional preventive measures like Firewall, Intrusion Detection and Anti-Virus appeared to be inadequate in the protection of sensitive data.

Why Enterprises establish Leakage-proof system

For enterprises, the internal data security is closely bound up with the enterprise security and normal operation of routine work. In some special circumstances, data security is the major part of business, directly related to the survival of enterprise. Based on this case, it is necessary to establish the relevant strategies, so that the effective leakage-proof system can be set up. Only in this way, the enterprise security can be ensured.

From the point of system value, it’s the question that data leakage in two areas, that is transmission and storage. From a security perspective, it needs a more comprehensive safety and preventive mechanism to realize the all-round protection. So how can we protect the enterprises’ data security fundamentally?

How encryption software works in enterprises’ data leakage-proof

To secure the data security of enterprise by the roots, it is suggested to choose a professional encryption software to encrypt data, because the encryption works on the data directly. As long as the encryption algorithm is not cracked, the data still remains safety.

Here an excellent encryption software called Best Encryption Expert is highly recommended, which supports features like file encryption, folder encryption, data shredding, folder protection and disk protection. Besides, there are various encryption types for users to choose. The encrypted files are copy-proof, remove-proof and delete-proof, in this way, the possibility of file leakage reduces a lot, while the security promotes greatly.

How to encrypt data with Best Encryption Expert

1. Download the software from official website or other download sites, and then install it.

2. Right-click a file to encrypt, and then choose Best Encryption in the system menu.

How Encryption Software Works in Enterprises'Data Leakage-proof?

3. Enter the encryption password in the pop-up window, choose the favorable encryption type, and then click “OK”, that’s it.

Official download address:

Which File Encryption Software is Better?

To encrypt a file, people wrack their brains from hiding files to encrypting system files and DOS commands encryption, even professional encryption software. Which file encryption software is better? Best Encryption Expert is a proper choice.

1. Security
In terms of file encryption software, there is no doubt that security is the most important element. If a file encryption software’s security doesn’t have a high security level, it may be lead to the data leak unconsciously. For any user, it may bring about serious consequences.
Best Encryption Expert adopts advanced algorithms and reaches highest possible security level make your data impregnable. The encryption speed is so rapid that it can reach 25-50M/s.
2. Usability
As for file encryption software, whether the encryption and decryption process can automatically carry on is an important indicator judging the usability of encryption software. The early encryption software carries on encryption and decryption in the dedicated software windows. The later encryption software starts to integrate file encryption and decryption into Explorer’s right-click menu, which promotes the usability of software.
To using Best Encryption Expert to encrypt files, all you need to do is selecting the encrypting file and clicking right button, which make encryption and decryption operation easy.

Best Encryption Expert developed by Luoyang Xiabing Software Technologies Ltd, adopting advanced algorithms keeps you independent of information leak. However, the high security level doesn’t mean that its operation is complicate. Best Encryption Expert helps you get rid of the weak usability of encryption software. Best Encryption Expert will be your preferred choice to protecting individual privacy.

Which File Encryption Software is Better?

Abstract of Best Encryption Expert:
Best Encryption Expert is an excellent file/folder encryption software. It can encrypt file/folder and hard disk. Except highest possible security level and rapidity, Best Encryption Expert boasts of folder disguise, folder hide, shred data etc. functions, which make your data impregnable.