Device Encryption

Why Use Device Encryption?

Full disk encryption means that the contents of a disk, usually the storage inside your device–which contains the operating system, programs you have installed, and your organizational data–are scrambled so that they cannot be easily accessed when the device is off.

Without this feature, someone who steals your device, finds your lost device, or otherwise accesses your hardware can easily read your files and possibly impersonate you to your systems. Even worse, an attacker can install malware that allows them to remotely access all your activities.

How-to Enable Device Encryption

Although full disk encryption is enabled by default on some mobile devices, it must be manually set up on all laptop and desktop computers, and many phones and tablets.

Desktop How-to:

Mobile How-to:

Device Encryption Caveats

Authentication Must Be Enabled Device encryption is not effective unless the device requires authentication to use. For example, you are required to log in when using your laptop or provide a PIN when using your mobile device.

Can Be Slow It is important to know that full disk encryption requires your device to do complex math, so turning on this feature will use processing power and may even make very old devices unreasonably slow to use.

Makes Disk Recovery Impossible Full disk encryption can also increase the risk of you losing access to some of your information if robust password- or PIN-management practices are not in place. A lost password or PIN as well as failure of the part of the disk where the encryption keys are stored will generally mean you (as well as anyone else) cannot recover your data. Ensure that you use syncing services and/or have regular backups of your data to minimize the risk of data loss.

Device Must Be Off or Locked Full disk encryption provides protection only when your computer is turned off, or turned on but awaiting a password to start up. Once you have logged in, the computer has the secret key needed for decrypting your data in its memory (so you can work!) and so even with the screen locked there is some risk of someone obtaining access to the contents of your computer while it is running or even sleeping. However, in general, surmounting those controls is a highly technical attack and that risk shouldn’t stop you from keeping your computer turned on or logged in when you need to work. It is, however, best to to turn off your devices whenever your device will be away from you in a hostile environment.

See also