You are now in the main content area

How to Encrypt Your Data

With your help, TMU can minimize online threats.

One of the most effective tools in your cybersecurity toolbox, encryption is the process of turning text or data into an unreadable format that can only be deciphered by the recipient using a virtual key or password. This is an effective way for preventing your data or accounts from falling into the wrong hands.

Encryption is commonly:

Used on networks to protect information being hosted or sent through the network.

Used to protect files and data on servers and hard drives.

Used to protect internet connections and secure websites.

Ways you can implement or use encryption technologies

Most device operating systems come with built-in encryption software you can use to protect your data and files. Examples of built-in encryption software for operating systems include:

With encryption software enabled, you can encrypt your files and make these only accessible with your own personal encryption key or password.

Virtual private networks (VPNs) are security software that establish secure, encrypted connections when you’re sharing or receiving data on public networks.

Learn more about and download GlobalProtect, TMU’s VPN software agent.

When using the internet, it’s important to practice safe browsing by only visiting websites that use secure, encrypted connections or you risk having your metadata and personal information stolen. Only visit encrypted websites with URLs that begin with “HTTPS” and look out for the lock symbol in the address bar of your browser.

Learn more tips for identifying and avoiding phishing websites.