If you have decided to use an electronic key, then buy two, configure them both, and keep the second key as a backup. A spare copy of the key significantly eases access to your information in the event that your key is lost or damaged.Below we will give some tips that we think are especially important: This is a durable and reliable means of securing information. Tips for using an electronic key for securing informationĮlectronic keys have now proven to be useful and essential tools for many years. Here it is possible to configure automatic activation of an encrypted disk when the key is connected, as well as automatic disabling of the disk when the key device is removed. Of course, for an encrypted disk placed on a USB storage drive, you cannot use this same USB device as an access key. In our blog, you will find an overview of the most popular devices for protecting your information. Some tokens or smart cards must first be initialized with the manufacturer’s utility. All devices, except USB flash disks, require you to first install the manufacturer’s drivers. When using some tokens users must also set and remember a PIN. The password for the disk will remain on the key in encrypted form. The master user can set a key for a disk immediately after installing the program, or by using the command Setup a Key in the main program window (see picture). A full list of compatible devices can be found here. As a key, you can use a USB flash disk, a token, or a smart card. For convenience and security, instead of a password to open an encrypted disk, you can use electronic USB access keys.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |