{"id":17362,"date":"2020-03-03T12:08:16","date_gmt":"2020-03-03T12:08:16","guid":{"rendered":"http:\/\/blogs.nist.ac.th\/technology\/?post_type=ht_kb&#038;p=17362"},"modified":"2020-03-03T12:08:16","modified_gmt":"2020-03-03T12:08:16","slug":"device-encryption-guide","status":"publish","type":"ht_kb","link":"https:\/\/blogs.nist.ac.th\/technology\/knowledge-base\/device-encryption-guide\/","title":{"rendered":"Device Encryption Guide"},"content":{"rendered":"<ul>\n<li>All Staff at NIST are required to use Device\/File Encryption on their devices<\/li>\n<li>All\u00a0other users are recommended to encrypt their files.<\/li>\n<li><strong>Why enable file encryption?<\/strong> If your device is lost or stolen, someone can scan all the data on your hard drive and find all\u00a0files saved on the device.<\/li>\n<li><strong>How can I reduce my exposure?<\/strong>\u00a0It is best to only\u00a0store files in school systems such as Google Drive or Veracross.<\/li>\n<li><strong>How\u00a0do I encrypt my files?<\/strong>\n<ul>\n<li>On a Mac,\u00a0To protect your files from hackers and thieves, Macs offer excellent encryption features built-in. You can encrypt your entire hard drive, encrypt an external drive, or just create an encrypted container for your most important files. Follow instructions to turn on File Vault in the <a href=\"https:\/\/www.howtogeek.com\/184675\/how-to-encrypt-your-macs-system-drive-removable-devices-and-individual-files\/\" target=\"_blank\" rel=\"noopener noreferrer\">first section of this help guide<\/a>.<\/li>\n<li>One a Windows machine?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>All Staff at NIST are required to use Device\/File Encryption on their devices All\u00a0other users are recommended to encrypt their files. Why enable file encryption? If your device is lost or stolen, someone can scan all the data on your hard drive and find all\u00a0files saved on the device. How&#8230;<\/p>\n","protected":false},"author":3,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[1154431],"ht-kb-tag":[1170518,1192738,1170516,1170514,601162,1170519,1072,1123247,589094],"class_list":["post-17362","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-it-support2","ht_kb_tag-data-protection","ht_kb_tag-encrypt","ht_kb_tag-encryption","ht_kb_tag-file-vault","ht_kb_tag-privacy","ht_kb_tag-protection","ht_kb_tag-safety","ht_kb_tag-secure","ht_kb_tag-security"],"_links":{"self":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/17362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/comments?post=17362"}],"version-history":[{"count":1,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/17362\/revisions"}],"predecessor-version":[{"id":17363,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/17362\/revisions\/17363"}],"wp:attachment":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/media?parent=17362"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-category?post=17362"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-tag?post=17362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}