Encryption transforms data into a locked format that cannot be read without a key.

You can encrypt stored data, data en route for communications and devices that may be used for storage. To unlock encrypted data, you need a key. Encryption is the best defense against unwanted use of data, before and/or after it is stolen.

Best Practices:

  • Encrypt all data as required by organizational policies.
  • Protect your encryption keys and never share them.
  • Use only organizationally approved and provided encryption tools and devices.
  • Encrypt the device that is used to store your encryption key.

Protect your Mobile Devices!

Notable Incidents:

Stolen unencrypted USB key from Infrastructure Canada (2018). Read more.

Stolen laptop from employee of Northwest Territories Department of Health and Social Services (2019). Read more.