Search results
Before you startThese instructions are for encrypting a USB storage device on a Windows computer, for use on a Windows computer When the USB has been encrypted, it cannot be used on a Mac The amount of time the USB takes to encrypt will depend on the size of the drive and the...
Overview
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...