We have now, all become dependent upon Information Technology in our daily lives. Regardless of which walk of life a person may belong to, it seems impossible that their lives are unaffected by technology. Certainly, this technological advancement has revolutionized the whole global scenario. Yet, like any other invention, it certainly has its own merits and pitfalls. Privacy violation and data theft have become a modern day menace, which raises some grave concerns.There are innumerable reports which highlight the ongoing crisis of data theft and privacy invasion. Data theft can have various forms and it is highly probable that your valuable data might end up in unauthorized hands. This theft can either be deliberate in the form of hacking, or unintentional through data loss and damage. In both situations, the victims of such e-crimes have minimum options and probability of retrieving their data back or preventing third parties from using the data are very minimalistic. Thus, they pose a great deal of danger for their users as there very personal and official information is at stake.
Being overly nave and optimistic, I used to assume that I was immune to such hazards. To my everlasting dismay, I also experienced, a similar situation last year, when I planned a summer trip on the coast of Mexico, and I also had to present company's new product to prospective clients. Prior official commitment, the warm fresh air, amazing people, cheap and less expensive lodging and boarding and the great Mexican food were all the factors which convinced me to spend some quality time outdoors. Sure enough, we landed at the Benito Juarez International Airport, and from there took a cab to our hotel. I got off from the cab hurriedly and checked into the room. Almost half an hour later I realized that I had left my hand baggage in the cab, which also contained my laptop and USB device. At first I panicked, but moments later I realized that on the referral of one of my colleagues I had an encryption software installed on my laptop.
With the help of this data security software, I had installed and availed some its very best in-built features including password protecting folders and files/ file locking, data and USB encryption. I was relieved and took a sigh as my data storage gadgets contained highly confidential and company related information that should be kept in secrecy. I had encrypted all of my data on my laptop and had set passwords to all of the files and folders that contained company's confidential projects and reports and also my private information. Also luckily enough, I had also encrypted my USB so the data contained in it would also be inaccessible to any other unauthorized user.
Being overly nave and optimistic, I used to assume that I was immune to such hazards. To my everlasting dismay, I also experienced, a similar situation last year, when I planned a summer trip on the coast of Mexico, and I also had to present company's new product to prospective clients. Prior official commitment, the warm fresh air, amazing people, cheap and less expensive lodging and boarding and the great Mexican food were all the factors which convinced me to spend some quality time outdoors. Sure enough, we landed at the Benito Juarez International Airport, and from there took a cab to our hotel. I got off from the cab hurriedly and checked into the room. Almost half an hour later I realized that I had left my hand baggage in the cab, which also contained my laptop and USB device. At first I panicked, but moments later I realized that on the referral of one of my colleagues I had an encryption software installed on my laptop.
With the help of this data security software, I had installed and availed some its very best in-built features including password protecting folders and files/ file locking, data and USB encryption. I was relieved and took a sigh as my data storage gadgets contained highly confidential and company related information that should be kept in secrecy. I had encrypted all of my data on my laptop and had set passwords to all of the files and folders that contained company's confidential projects and reports and also my private information. Also luckily enough, I had also encrypted my USB so the data contained in it would also be inaccessible to any other unauthorized user.
SHARE