Problem solve Get help with specific problems with your technologies, process and projects.

Are encryption products better than self-destructing data?

Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds."

Your article on laptop encryption was interesting. How effective are "lost data deletion" technologies that delete protected files as soon as a stolen laptop accesses the Internet?
I am personally very uncomfortable with such technologies because they often go awry. Such tools can falsely trigger, preventing users from accessing data until it can be restored from a backup. At worst, though, the tool could destroy data that isn't backed up at all.

As a kid, I remember hearing the audio in the Mission: Impossible TV show with its urgent exhortation that, "This tape will self destruct in five seconds." While it may be a cool gimmick in a spy-vs.-spy TV show, self-destructing data can cause problems for large enterprises.

I much prefer solid encryption products that require a difficult-to-guess and difficult-to-crack passphrase, not just the user's operating system password. Better yet, I like to see encryption products that store the crypto keys on a separate token, such as a USB key fob, but still require a strong passphrase for decrypting the data.

More information:

  • Read Ed's previous article on laptop encryption.
  • Learn the right way to manage your encryption keys.
  • This was last published in June 2007

    Dig Deeper on Disk and file encryption tools

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.