To Encrypt or Not to Encrypt
My guess would be that majority of the people in the world do not encrypt or protect their personal information, needless to say that I am as guilty as the rest.
However working in this industry has opened my eyes to a number of different ways that people extract and use your information without you ever knowing.
With the extremely high rise in identity theft it's become an increasingly popular practice to purchase encryption based software to further protect sensitive information.
While the major operating systems provide a certain level of encryption security to your emails and telephony calls, this type of standard software based applications does not provide 100% guaranteed security.
It has been seen from recent press reports that organisations & individuals have been able to access other people's emails, telephone calls and more, only because these people failed to protect themselves, probably because they didn't know that this could be done.
We of course do not condone or advocate this type of activity, Private Investigators / Private Detectives who use this route to obtain information run extremely high risks and bring the whole industry into disrepute.
We would however like to suggest that most people investigate the possibility that your information is never 100% secure, therefore make certain that when you are sending personal and sensitive information you check that encryption box.
The likely hood of your emails or telephone conversations to cause a stir are few and far between so here are a couple of precautionary steps you can take to prevent identity theft.
(sorted by complexity): • Archive your document in an encrypted 7-zip file.
7-zip is regarded as the industry "standard" it's rather unlikely the recipient will be able to open the file without installing a third party software or a decryption software.
• Encrypt your files with AxCrypt.
There are a number of Open Source providers that offer this type of software for both encryption and decryption.
AxCrypt uses AES 128 to encrypt the files.
Send the encrypted files by email and then find an alternative method to issue the password for the encryption.
Best of luck!