From the course: Security Tips: Protecting Sensitive Information

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Next steps

Next steps

- [Scott] Throughout this course, we've explored ways that sensitive information can be accidentally shared and ways to mitigate that risk. We've also taken a look at how to encrypt files and disks in order to protect information. While encryption is a powerful tool for protecting information, it's not the only tool we should use. Someone may discover a clever way of defeating encryption algorithms tomorrow or the algorithms may never be broken. Many older algorithms have been defeated in the real world or in theory. So it's best to use encryption that's standard and trusted rather than outdated or compromised. Most updated tools handle this for us. And we'll warn if an algorithm we're using is no longer considered secure. So it's important to keep encryption tools updated as well as keeping the operating system and antivirus anti-malware tools updated too. Even in the best laid plans for protecting sensitive…

Contents