
In today’s episode, I review password and encryption options so you can select and apply the best option for securing your projects. This topic is especially relevant now. With the sudden shift to remote work back in the spring, cybercrime has spiked as bad actors have taken full advantage of these security vulnerabilities that have resulted from companies’ lack of preparation for these changes.
Passwords and encryption, when applied correctly and consistently, protect sensitive data in transit and at rest. But I’ve found that many people don’t fully understand some of the practical aspects of these tools, and so they don’t know when and how to best use them in different situations. At worst, a belief by a user that data is more protected than it really is can leave sensitive data vulnerable and leave an otherwise secure intellectual property supply chain exposed. Like any other chain, the supply chain comprising IP specialists is only as strong as its weakest link.
Today, learn how to not be the weak link.
[You can find the transcript for today’s episode here.]
If you enjoyed this episode, we hope you will leave a comment. We’d love to hear from you! And don’t forget to rate us in your favorite podcast app…
Resources
How to securely wipe your computer
PC Magazine: The Best Encryption Software for 2020
Acknowledgments
Thanks to Duke City Consulting, LLC for its underwriting of this podcast!
Credits
Outro voice-over: Silvana Byram
Music: Rainbow Beat by Tim Beek (timbeek.com)