{"id":1976,"date":"2019-05-31T10:59:46","date_gmt":"2019-05-31T10:59:46","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1976"},"modified":"2020-05-01T11:41:57","modified_gmt":"2020-05-01T11:41:57","slug":"full-disk-encryption-vs-file-and-folder-encryption","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/","title":{"rendered":"Full Disk Encryption vs File and Folder Encryption"},"content":{"rendered":"\n\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\">Data at rest, Data in Transit and Data in Use, these three terms we often hear when someone talks about data protection. This article explains why you should use file and folder Level encryption on top of full disk encryption. Let&#8217;s drive into detail of full disk encryption\u00a0 vs file and folder encryption.<\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\">Individual and business users want to take solace in knowing that if an attacker ever finds their documents, this \u201cdata at rest,\u201d will be useless and unreadable.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Most data breaches are either due to insider actions, both intentional and accidental, or are intercepted while in transit. Both of these cases involve the proper operation of data storage devices.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Unfortunately, people often leave this data unprotected. Once an attacker has gained access to the remote file shares, it\u2019s simply a matter of traversing directories, finding the files that he or she wants, and copying them.<\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt;\"><strong>What is Full Disk Encryption(FDE)?<\/strong><\/span><\/h4>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\">In <a href=\"https:\/\/en.wikipedia.org\/wiki\/Disk_encryption\">Full Disk Encryption<\/a> technology, the whole disk gets encrypted using an encryption key. When the system starts, it prompts the user to provide an encryption key, and using that encryption key data is decrypted and the system boots and runs normally.<\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt;\"><strong>What is File System Level Encryption(FFE)?<\/strong><\/span><\/h4>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\">With <a href=\"https:\/\/en.wikipedia.org\/wiki\/Filesystem-level_encryption\">File level encryption<\/a>, individual files and directories in the filesystem are encrypted by the filesystem itself. It does not encrypt the disk as a whole. Rather, encryption is done on filesystem level.<\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\">Using this encryption technology, we can efficiently encrypt and decrypt selected files and directories in the filesystem, where other not so important files and directories can remain unencrypted at the same time.<\/span><\/p>\n<h3 class=\"p3\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><b>Full disk encryption<\/b><\/span><\/h3>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Sure, you could encrypt your entire hard drive, and you should! However, this is only one layer of a good security policy. Experts will tell you that it\u2019s always a good idea to utilize multiple layers of security in case one fails. Your policy should have many layers, like an onion.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">In the world of information security, experts refer to this concept as \u201c<span class=\"s1\">defense-in-<\/span><span class=\"s1\">depth<\/span>.\u201d<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">The problem with relying on full disk encryption is that it was never meant to fit the use case of the machines that are hosting files online 24 hours per day. Typically, a user powers on a machine and enters the encryption key.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">The entire drive is then decrypted, and is not re-encrypted again until the machine is powered off. If a user were to rip the hard drive out of the machine, the files contained on this fully encrypted drive would not be accessible to the attacker.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">However, what if the attacker was able to compromise the machine hosting the files while it was powered on?\u00a0<span class=\"s1\">Game <\/span><span class=\"s1\">over<\/span>.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">I don\u2019t want to discredit full disk encryption, I merely want to state that it does not provide the level of protection that experts sometimes assume. A good analogy would be locking the door to your house, but leaving all of your jewelry and financial information prominently displayed on your dining room table.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Once someone bypasses the door lock, they have what they\u2019re looking for. In this way, once the hard drive has been decrypted (when the system boots up and the encryption key is entered), user files are no longer safe.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><strong>How to <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\">stop thieves in their tracks<\/a>?<\/strong><\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Using Kruptos 2 Professional is analogous to storing your jewelry and financial information in a locked safe that only the owner knows the combination to. It\u2019s an extra layer of defense, and an important one. While full disk encryption protects the user against theft of the hard drive, Kruptos 2 Pro, protects the user against unauthorized access.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Kruptos 2 Pro provides transparent and automatic file and folder encryption of individual files or folders at their inception and <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-view-or-edit-your-files-securely\/\">during view or editing<\/a> of those files. Inherent and Krutpos 2 Pro encryption protects the data whether leaked, lost, or stolen.<\/span><\/p>\n<h3 class=\"p3\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><b>Even more secure: Individual file and folder encryption<\/b><\/span><\/h3>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">One mitigation to this threat is to encrypt individual files in such a way that an unauthorized user cannot decrypt them. As an example, let\u2019s say that your file server houses both medical and legal documents. You want to make sure doctors cannot access legal documents, and that lawyers cannot access medical documents.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">If you are using full disk encryption, you can\u2019t guarantee this requirement. Once a machine is powered on and the encryption key entered, any doctor or lawyer using the machine would be able to access any document on the system.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">What you need is a system that encrypts individual files or at folder level where you grouped many files together, and does not decrypt them until a user with rights to view documents tries to access them. If a doctor logs on to such a system and starts poking around, he would find that legal documents are encrypted.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">Even if he were to try to export the legal files to a USB flash drive, they would be useless and unreadable because of the encryption.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">As I mentioned earlier, our solution is <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Kruptos 2 Professional<\/a>. When a user configures Kruptos with individual password to use this capability, individual files are completely encrypted, and are not decrypted until a user with right master or individual password on and opens the document.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">If a user without right password for the file, they would not be able to open any documents. The documents are encrypted using strong, industry standard <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/commonly-used-encryption-algorithms\/\">encryption algorithms<\/a> \u2013 either AES-128 or AES-256.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><strong>Any File:<\/strong> With no need to consciously remember to encrypt data that is being processed, enjoy a secure yet natural workflow. Kruptos works for any kind of file.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><strong>Any Place:<\/strong> Every file is encrypted no matter where it resides \u2013 from creation to storage on any location or medium, even in the cloud. Kruptos supports <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-share-your-file-with-clients-securely\/\">all major cloud folder providers<\/a> such as dropbox, google drive, box, icloud, etc.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><strong>Any Time: <\/strong>Whenever a file is accessed, edited, moved, duplicated, or touched in any way, the encryption remains in effect. Any changes made are automatically encrypted by Kruptos when you close the file.<\/span><\/p>\n<h3 class=\"p3\"><span style=\"font-family: Helvetica; font-size: 12pt;\"><b>Final Thoughts: Full disk encryption Vs file and folder encryption<\/b><\/span><\/h3>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">In the end, both of these security measures are imperative. Full disk encryption is\u00a0important and a good start, but file and folder encryption is a way to build on that to <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/2-ways-to-keep-your-sensitive-files-safe\/\">make the system\u00a0<span class=\"s1\">even more secure<\/span><\/a> and allows to limit data access to authorized applications for specific purposes.<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: Helvetica; font-size: 12pt;\">So the next time you are asked, \u201cHow are <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/usb-security\/\">our files protected<\/a>?\u201d have a discussion about the pros and cons of full disk encryption and file encryption. You may find out you\u2019re not defending against all of the threats to your sensitive data.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Data at rest, Data in Transit and Data in Use, these three terms we often hear when someone talks about data protection. This article explains why you should use file and folder Level encryption on top of full disk encryption. Let&#8217;s drive into detail of full disk encryption\u00a0 vs file and folder encryption. Individual and &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\"> <span class=\"screen-reader-text\">Full Disk Encryption vs File and Folder Encryption<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,37],"tags":[33,54,53],"class_list":["post-1976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-online-safety","tag-encryption","tag-file-and-folder-encryption","tag-full-disk-encryption"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Full Disk Encryption vs File and Folder Encryption - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"This article explains why you should use file and folder encryption on top of fulldisk encryption Plus full disk encryption\u00a0vs file and folder encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Full Disk Encryption vs File and Folder Encryption - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"This article explains why you should use file and folder encryption on top of fulldisk encryption Plus full disk encryption\u00a0vs file and folder encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-31T10:59:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-01T11:41:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3000\" \/>\n\t<meta property=\"og:image:height\" content=\"2250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"Full Disk Encryption vs File and Folder Encryption\",\"datePublished\":\"2019-05-31T10:59:46+00:00\",\"dateModified\":\"2020-05-01T11:41:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\"},\"wordCount\":1116,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg\",\"keywords\":[\"Encryption\",\"file and folder encryption\",\"full disk encryption\"],\"articleSection\":[\"Data Protection\",\"How To\",\"Online Safety\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\",\"name\":\"Full Disk Encryption vs File and Folder Encryption - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg\",\"datePublished\":\"2019-05-31T10:59:46+00:00\",\"dateModified\":\"2020-05-01T11:41:57+00:00\",\"description\":\"This article explains why you should use file and folder encryption on top of fulldisk encryption Plus full disk encryption\u00a0vs file and folder encryption.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg\",\"width\":3000,\"height\":2250,\"caption\":\"Full disk encryption Vs file and folder encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Full Disk Encryption vs File and Folder Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Full Disk Encryption vs File and Folder Encryption - Kruptos Security Blog","description":"This article explains why you should use file and folder encryption on top of fulldisk encryption Plus full disk encryption\u00a0vs file and folder encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Full Disk Encryption vs File and Folder Encryption - Kruptos Security Blog","og_description":"This article explains why you should use file and folder encryption on top of fulldisk encryption Plus full disk encryption\u00a0vs file and folder encryption.","og_url":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-05-31T10:59:46+00:00","article_modified_time":"2020-05-01T11:41:57+00:00","og_image":[{"width":3000,"height":2250,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg","type":"image\/jpeg"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"Full Disk Encryption vs File and Folder Encryption","datePublished":"2019-05-31T10:59:46+00:00","dateModified":"2020-05-01T11:41:57+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/"},"wordCount":1116,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg","keywords":["Encryption","file and folder encryption","full disk encryption"],"articleSection":["Data Protection","How To","Online Safety"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/","url":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/","name":"Full Disk Encryption vs File and Folder Encryption - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg","datePublished":"2019-05-31T10:59:46+00:00","dateModified":"2020-05-01T11:41:57+00:00","description":"This article explains why you should use file and folder encryption on top of fulldisk encryption Plus full disk encryption\u00a0vs file and folder encryption.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/full-disk-encryption.jpg","width":3000,"height":2250,"caption":"Full disk encryption Vs file and folder encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/full-disk-encryption-vs-file-and-folder-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Full Disk Encryption vs File and Folder Encryption"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1976"}],"version-history":[{"count":9,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1976\/revisions"}],"predecessor-version":[{"id":2231,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1976\/revisions\/2231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1979"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}