So you now have one of these marvelous little USB drives (or a portable hard drive, iPhone, Blackberry, etc.) and the ability to carry around a whole encyclopedia’s worth of information in your pocket. Unfortunately, that also means that you have the ability to efficiently lose all of that information and have it land in the hands of the wrong individual. It seems as though a day doesn’t go by when there isn’t at least one USB drive left in the computer lab. And stories about lost drives & laptops containing thousands of names and personal files are now so commonplace that they don’t even make the news. Taking all this in you may be tempted to ask – is there any way to absolutely, positively secure the files on my portable device?
The short answer is . . . no.
You read that right, no. There is no such thing as data security – isn’t paranoia fun? That said we do have a responsibility to do our best to make sure that if the device goes astray it’s really (REALLY) hard to access the information.
- The first and most basic thing is to identify your device so if someone finds it they can easily return it to its proper home. This can be accomplished very low tech by simply labeling the device with your contact information. A little more technical approach (and one that won’t wear/peel off after repeated use) is to place a text (MS Word, etc.) file on the drive with your contact information and name it something obvious to someone trying to access the drive (e.g. “owner.txt” or “return this to John Doe.doc”) so when they open it up they can figure out where to return it to.
- Keep a synchronized copy on your hard drive so that if (when) your device goes AWOL you only lose the physical device and not the data. Microsoft has a free tool called SyncToy which will automatically synchronize files between any two folders which is pretty simple and basic. There are countless other ways to sync files back and forth so feel free to use whatever tool you want, just use one!
- Now your files are backed up and your drive is easily identifiable for when it is lost, what options exist to secure the actual information on the device?
- File Level – Many programs offer the user the ability to password protect individual files, while generally not NSA level security this will discourage casual attempts to access the file. In Microsoft Office 2003 (Word, Excel, etc.) a password can be applied when saving by choosing File>Save As… and in the save dialog box choose the Tools>Security Options… drop down menu in the upper right hand corner. Or with the document open choose Tools>Options… and click on the Security tab. Either of these methods will take you to a box with relatively straightforward options for file security. For more information do a web search on password protecting your specific file type/program or feel free to contact me (I have a more detailed description of MS Office file protection available.)
- Directory Level – If you have an entire directory to protect there are a few different ways to go about it. The simplest (and one that doesn’t require administrative rights on the computer) is to compress the file into a “.zip” format using WinZip, WinRar, 7-Zip or similar software and use the password protection feature built into the software. For an actual NSA level encryption there is software available such as TrueCrypt or FreeOTFE which have the ability to lock the files down to such an extent that it’s virtually impossible for today’s technology to get past it (note the emphasis on today, by tomorrow or next week the capabilities will have changed and all bets will be off.) Most of these options however require that software run on the host computer so the files may not be accessible at a workstation with the heavy user restrictions in place such as many libraries and computer labs. The use of these tools is also beyond the scope of this article so if these options sound interesting check out the FAQ’s on the respective programs pages or feel free to contact me (I use TrueCrypt and have a more detailed description of its usage available.)
- Device Level – Just in case you inherit the rights to the formula for Coca-ColaÔ or the Cols. Original RecipeÔ there is a class of devices which include hardware encryption. What that means is that in addition to the flash memory these devices have a chip or piece of hardware which runs the encryption independent of the computer so no administrator or special rights are needed on the computer. While none of them will blow up Mission Impossible style if an unauthorized user tries to access them they do offer about the most secure solution possible.
So your drive is labeled and secure now, you haven’t lost it, everything is synchronized on your computer . . . except you forgot it on the counter. Now what? While it falls outside the scope of this article there are other options for transferring files from one point to another; email it to yourself, use any number of the online storage spaces to house it, create it or save it to Google Docs or MS Office Live, etc.
In reality, the only limitation in our ability to secure files is the motivation to do so., just remember that the only thing standing between these files and the ability of an unauthorized user to access them is time and the forward march of our technological capabilities.
I apologize for the wordiness of this, please feel free to comment or mention any other software you may have used or are curious about.