The Importance of Notebook drive Encryption

PeterWallace

I just finished reading some alarming stats from a study on Laptop Encryption that I took a part in.

720 IT Security professionals and 874 Business managers from US based organizations were polled about their use of laptop encryption. The study showed 82% of the IT Security Professionals and 58% of Business Managers have employer provided encryption solutions on their laptops. But the study went on to ask other questions and this one was alarming, have you ever disengaged your laptop’s encryption software? 56% of the business managers and 25% of the It Security professionals answered yes often not taking precautions to protect their data!

Why is laptop encryption important you ask?

According to a data breach clearing house, more than 32% of data breaches were the result of a lost or stolen laptop. If you compare this to the fact that only 14% of data breaches were the result of a hacking event, you begin to see where the real problem lies with regards to data security, it is outside the firewall. Desktop sales have slumped dramatically, in favor of notebook computers as well as the newer and smaller netbooks, as a result laptop and mobile device theft and loss related data breaches are expected to sky rocket this year.

What can we do for Laptop Encryption? Start using something!

Microsoft has provided ways to do this starting with Windows XP Pro (sorry Windows XP home does not have this) using the EFS (Encrypting File System) to store files on your hard drive. You can only encrypt files on volumes that are formatted with the NTFS file system as volumes that use the FAT file system will not encrypt and will error. Windows Vista and Windows 7 Ultimate and enterprise operating systems included Bit Locker Drive Encryption which is a full disk encryption. Bit Locker Drive Encryption is a logical volume encryption system. A volume may or may not be an entire drive, and can span one or more physical drives. Encrypting File System may be used in conjunction with Bit Locker to provide protection once the operating system kernel is running. Protection of the files from processes/users within the operating system can only be performed using encryption software that operates within Windows, such as Encrypting File System. Bit Locker and Encrypting File System therefore offer protection against different classes of attacks.

Users of other systems will need to look into 3rd party solutions. There are many out there from open source like truecrypt ( www.truecrypt.org ) to fully paid versions like PGP Whole Disk Encryption ( www.pgp.com ).

92% of the IT Security Professionals report that someone in their organization has had a laptop lost or stolen and 71% report that it resulted in a data breach. Only 45% report that the organization was able to prove the contents were encrypted! What are you waiting for?

Lost USB Drives or Smart Phones? Wait that’s another day and another set of Encryption.

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers