55 www.virtual-teams.eu 6.4. Resources for implementation If you wish to play your part in keeping you and your company’s data safe from any potential harm it may be useful to use or try some of the following: Keeping remote devices safe and securely protected: There are quite a few antivirus software programs available. Bitdefender – loads of features, excellent core virus protection, Safepay banking protection and is a superb value for money. Kaspersky – Fast and configurable virus scans, impressive anti-ransomware capabilities but not a huge number of features. Norton Antivirus – Highly impressive browsing protection, loads of features and useful bundles backup tool but it has a more performance impact than other options available. McAfee Antivirus - Bundled VPN with unlimited usage but the anti-virus engine isn’t good compared to the others mentioned. One plan can only cover one device. Content encryption: There are a few to choose from depending on the content you want to encrypt. ● Twofish - It’s a symmetric key block cipher (A block cipher takes a block of plaintext bits and generates a block of ciphertext bits) with a block size of 128 bits, with keys up to 256 bits. It is related to AES (Advanced Encryption Standard) ● AES - Advanced Encryption Standards (also known as Rijndael) is one of the most widely used methods for encrypting and decrypting sensitive information in 2020. This encryption method uses what is known as a block cipher algorithm (A block cipher takes a block of plaintext bits and generates a block of ciphertext bits) to ensure that data can be stored securely. ● RSA - The RSA algorithm is an asymmetric cryptography algorithm; this means that it uses a public key and a private key (i.e two different, mathematically linked keys) ● Triple DES - Triple DES runs three times slower than DES but is much more secure if used properly. The procedure for decrypting something is the same as the procedure for encryption, except it is executed in reverse
RkJQdWJsaXNoZXIy NzYwNDE=