{"id":1590,"date":"2014-04-18T19:55:53","date_gmt":"2014-04-18T19:55:53","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1590"},"modified":"2019-05-31T09:19:31","modified_gmt":"2019-05-31T09:19:31","slug":"should-i-encrypt-every-file","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/","title":{"rendered":"Should I Encrypt Every File on My Computer?"},"content":{"rendered":"\n<p>It&#8217;s great that you&#8217;re thinking about protecting your files, with all kinds of snoops out there (from big government to identity thieves). You&#8217;re right, though\u2014you don&#8217;t need to encrypt every single file you store or send (especially the MP3s). This article helps to answer your question should i encrypt every file on my computer or not.<\/p>\n\n\n\n<p>Financial records are the obvious types of information you should protect, but there are many other kinds of files you should encrypt as well. <\/p>\n\n\n\n<p>Encrypting these files will make sure that even if someone gets through your firewall or if your laptop is stolen and your password guessed your data will still be protected.<\/p>\n\n\n\n<p> Basically there are two kinds of sensitive data you should encrypt: personally identifiable information and confidential business information\/intellectual property.&nbsp;<br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PERSONALLY IDENTIFIABLE INFORMATION (PII)<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.lifelock.com\/learn-identity-theft-resources-what-is-personally-identifiable-information.html\">Personally Identifiable Information or PII<\/a> is any kind of information that can uniquely identify you, such as your social security number, driver&#8217;s license number, or full name.<\/p>\n\n\n\n<p>Because thieves can easily steal your identity if they gain access to your PII, it&#8217;s really important you protect all of the documents you have that contain this information. <\/p>\n\n\n\n<p>According to the National Institute of Standards and Technology (NIST), Here are list of use cases for should I encrypt every file or not, this information includes: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Name, such as full name, maiden name, mother&#8217;s maiden name, or alias<\/li><li>Social security number (SSN), passport number, driver&#8217;s license number, taxpayer identification number, or financial account or credit card number<\/li><li>Address information, such as street address or email address<\/li><li>Personal characteristics, including photographic image, especially a face image or other identifying characteristic; fingerprints; handwriting; or other biometric data, such as retina scan, voice signature, and facial geometry<\/li><li>Information about an individual that is linked or linkable to one of the above categories, such as date of birth, place of birth, race, religion, weight, activities, geographical indicators, employment information, medical information, education information, and financial information<\/li><\/ul>\n\n\n\n<p>Expanding on the above, you should add to your encryption container:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bank account statements, credit card statements, tax records<\/li><li>Medical records like health insurance benefits and medical payments<\/li><li>Work performance reviews<\/li><li>Educational records, thesis<\/li><\/ul>\n\n\n\n<p>That may sound like a lot, but when you think about it all of this data boils down to your vital information (health, education, work, finances)\u2014easily organized into folders that you can encrypt. <\/p>\n\n\n\n<p>So in addition to your financial statements and tax folders, also encrypt your folders with basic life information (health, education, work) or however you organize them. <\/p>\n\n\n\n<p>It may go without saying, but you should also have any security-related things already encrypted: Passwords and PINs, for example.&nbsp;<\/p>\n\n\n\n<p><strong>ENCRYPT CONFIDENTIAL BUSINESS INFORMATION\/INTELLECTUAL PROPERTY<\/strong><\/p>\n\n\n\n<p>If you keep any files on your computer that are work related, you may need to encrypt those as well\u2014especially any that contain individual customer information. (As a former tech director who worked in the field of consumer marketing, I know that protecting personal customer information is paramount.)<\/p>\n\n\n\n<p>If you work in an industry like banking or health care, you&#8217;ll also be subject to regulatory standards for protecting consumer information. <\/p>\n\n\n\n<p>Business information or &#8220;secrets&#8221;\/intellectual property may need to be protected too\u2014financial reports, legal docs, patents, product releases, research and development data, and so on. <\/p>\n\n\n\n<p>It&#8217;s often said that when laptops get stolen it&#8217;s not the hardware that&#8217;s most valuable to thieves, it&#8217;s the information on it.&nbsp;<\/p>\n\n\n\n<p><strong>TWO TESTS FOR WHETHER  SHOULD I ENCRYPT EVERY FILE OR NOT<\/strong><\/p>\n\n\n\n<p>Here are two questions you can ask about any file you&#8217;re considering encrypting:&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If the file was on paper instead of in digital form, <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/file-shredder\/\">would you shred the paper before throwing it out<\/a>?<\/li><li>If this information was leaked or posted to the interwebs tomorrow, could there be terrible repercussions or could someone do something malicious with it?<\/li><\/ul>\n\n\n\n<p>Keep in mind, too, that you should safeguard all the media and places where these sensitive or confidential files may be found: Your backup files, for example, email PSTs, <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/2-ways-to-keep-your-sensitive-files-safe-on-a-usb-drive-or-external-hard-drive\/\">a portable drive you use for backup<\/a>, your smartphone. All of this said, you probably have much more data that&#8217;s not sensitive and doesn&#8217;t require cryptography.<\/p>\n\n\n\n<p> Protect the ones that do, and you can rest easy. And if you want a faster, easier solution, a full disk encryption is a good idea\u2014especially on laptops that can get easily lost; the full disk encryption will protect all your data and ensure no one can break into <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">your Windows computer <\/a>or <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2mac.html\">your Mac.<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-kruptos-security-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"KtdQrYK37V\"><a href=\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/\">9 Encryption Use Cases When You Should Use?<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;9 Encryption Use Cases When You Should Use?&#8221; &#8212; Kruptos Security Blog\" src=\"https:\/\/kruptos2.co.uk\/blog\/9-encryption-use-cases-when-you-should-use\/embed\/#?secret=63zLNkVSqa#?secret=KtdQrYK37V\" data-secret=\"KtdQrYK37V\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s great that you&#8217;re thinking about protecting your files, with all kinds of snoops out there (from big government to identity thieves). You&#8217;re right, though\u2014you don&#8217;t need to encrypt every single file you store or send (especially the MP3s). This article helps to answer your question should i encrypt every file on my computer or &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\"> <span class=\"screen-reader-text\">Should I Encrypt Every File on My Computer?<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1591,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,36,26],"tags":[33,29,30],"class_list":["post-1590","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-kruptos-news","category-security-alerts","tag-encryption","tag-privacy","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Should I Encrypt Every File on My Computer? - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"This post explains clearly whether should I encrypt every file on your computer or not plus what is PII standards as well two use cases helps you decide\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should I Encrypt Every File on My Computer? - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"This post explains clearly whether should I encrypt every file on your computer or not plus what is PII standards as well two use cases helps you decide\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-18T19:55:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-31T09:19:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"Should I Encrypt Every File on My Computer?\",\"datePublished\":\"2014-04-18T19:55:53+00:00\",\"dateModified\":\"2019-05-31T09:19:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\"},\"wordCount\":762,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg\",\"keywords\":[\"Encryption\",\"Privacy\",\"Security\"],\"articleSection\":[\"Data Protection\",\"How To\",\"Kruptos News\",\"Security Alerts\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\",\"name\":\"Should I Encrypt Every File on My Computer? - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg\",\"datePublished\":\"2014-04-18T19:55:53+00:00\",\"dateModified\":\"2019-05-31T09:19:31+00:00\",\"description\":\"This post explains clearly whether should I encrypt every file on your computer or not plus what is PII standards as well two use cases helps you decide\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Should I encrypt every file\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Should I Encrypt Every File on My Computer?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Should I Encrypt Every File on My Computer? - Kruptos Security Blog","description":"This post explains clearly whether should I encrypt every file on your computer or not plus what is PII standards as well two use cases helps you decide","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/","og_locale":"en_US","og_type":"article","og_title":"Should I Encrypt Every File on My Computer? - Kruptos Security Blog","og_description":"This post explains clearly whether should I encrypt every file on your computer or not plus what is PII standards as well two use cases helps you decide","og_url":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/","og_site_name":"Kruptos Security Blog","article_published_time":"2014-04-18T19:55:53+00:00","article_modified_time":"2019-05-31T09:19:31+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg","type":"image\/jpeg"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"Should I Encrypt Every File on My Computer?","datePublished":"2014-04-18T19:55:53+00:00","dateModified":"2019-05-31T09:19:31+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/"},"wordCount":762,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg","keywords":["Encryption","Privacy","Security"],"articleSection":["Data Protection","How To","Kruptos News","Security Alerts"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/","url":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/","name":"Should I Encrypt Every File on My Computer? - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg","datePublished":"2014-04-18T19:55:53+00:00","dateModified":"2019-05-31T09:19:31+00:00","description":"This post explains clearly whether should I encrypt every file on your computer or not plus what is PII standards as well two use cases helps you decide","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/file-encryption.jpg","width":1920,"height":1080,"caption":"Should I encrypt every file"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/should-i-encrypt-every-file\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Should I Encrypt Every File on My Computer?"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1590"}],"version-history":[{"count":5,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1590\/revisions"}],"predecessor-version":[{"id":1974,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1590\/revisions\/1974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1591"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}