By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
I think the best option for the scenario you describe is to use a form of encryption that does not store the encryption keys in a manner where they are accessible to system administrators. If you're using Microsoft Office 2007, the easiest way to do this is to use Office's built-in encryption feature to password-protect your files. You'll need to share the password with other upper-level executives in an offline fashion. (Remember, if you email it, chances are the network administrator can read your email!)
Also, notice that I specifically said that this option applies only to those using Office 2007. This latest release of Microsoft Office uses the strong AES encryption algorithm to protect data. Earlier versions of Office use a much more primitive algorithm that is easy to defeat.
Dig Deeper on Active Directory and LDAP Security
Related Q&A from Mike Chapple
Vulnerability scanning tools are necessary to be fully compliant with PCI DSS, but the tools need to come from a PCI DSS Approved Scanning Vendor. ...continue reading
Healthcare clearinghouses like Mass HIway are a new trend in health IT, but what are the security implications? Expert Mike Chapple explains what you...continue reading
The FFIEC Cybersecurity Assessment Tool has faced harsh criticism since its 2015 release. Expert Mike Chapple reviews the tool and how it can be ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.