(b) Encrypt your hard drive
If you laptop is been stolen in this case the investigator’s laptop is been stolen, nothing to stop the thief from removing your hard drive and attaching it to another computer. They will by passes any account password protection and allow them to access your data easily.
To prevent this is to encrypt you laptop’s hard drives, the encrypted drives can only be accessed after the encryption key is supplied- usually in the form of a pin, password or by inserting a USB stick containing the key. The use of Bitlocker can encrypt your entire drive.
(c) The use of a virtual private network (VPN) …show more content…
If there’s no access to a company VPN, you can use one from the service provider such as StreamVia or StrongVPN. This ensures your data is encrypted and protected from other users of the public local network.
(d) Use secure email
To connect to a VPN connecting could be difficult to ensure that any email program, webmail system or cloud based email service that you use is configured to use a secure socket layer (SSL) or transport layer security (TLS). This ensures that both your username and password, and the contents of your emails, are encrypted as they travel across the internet.
(e) Protect yourself from other