• Don’t miss the newest edition – The Chinese manual READ MORE
  • New: Case studies on investigative reporting from the Balkans READ MORE
  • Great news for journalists from Nepal: Our Nepali edition is online! READ MORE

Before getting into further detail about popular security tools, it is important to understand the different ways data is used and stored on a device. Experts distinguish between ‘data at rest’, ‘data in use’ and ‘data in motion’, sometimes also referred as ‘data in transit’.

The term ‘data at rest’ implies all data stored on a device is not moved actively. Instead, the data can be found on the hard drive, server, archives or databases. When protecting long-term stored data it is essential to monitor who has access to your information or folders on your network.

The first step is changing the password of the administrator. Sometimes, there is no administrator password present or just a really short one. This allows hackers to enter the device easily. The second step is to refrain from regularly using your computer with administrator rights. Windows systems especially give the normal user all rights automatically. Set up a new admin account on your computer and use it only if necessary. Limit user rights of your normal account to a minimum. This can protect you from malware because you don’t have the right to install applications anymore. It is furthermore not recommended to have guest user accounts in order to prevent others from misusing the rights of the account.