|For support: call extension 5-Help (212-305-4357) or email us
See the Approved Encryption page for a current list of approved methods and equipment.
Recommendations on this page are provided as a courtesy only, anyone requiring further assistance with the installation, use and troubleshooting of any software and hardware at CUMC should refer to the Computer Support page.
Before Using Any Encryption Program
Full information on Encryption requirements at CUMC can be found within the IT Policies, Procedures and Guidelines area of our website.
The purpose of any encryption software is to make data unreadable if proper authentication is not provided. Issues including permanent loss of data can occur if you do not adequately prepare your computer and data before installing or beginning to use encryption.
It is also important that you do not forget or lose any password you set in an encryption program. Doing so may mean that you can no longer access the files; many programs do not provide a backup method to decrypt data without the password.
- Verify that the software is compatible with your computer and existing software. The What OS am I using? page can help you determine your operating system and version.
- Review the program's installation and help documents to understand how you will be using it.
- Backup your existing data and files and follow any CUMC requirements for storage and encryption of backups. For most faculty and staff, CUMC IT managed network drives are the easiest way to do this.
Disk Encryption and Pre-Boot Authentication
Not all programs listed below can provide pre-boot authentication; it is indicated where available.
See the BitLocker page for information on its use at CUMC.
No longer recommended
Symantec Endpoint Encryption
Symantec Endpoint Encryption (SEE) is no longer available for download and should no longer be installed. Please contact your Certified IT Group to have SEE removed and BitLocker set up instead.
Individual File and Folder Encryption
IMPORTANT: Truecrypt has posted a message on their website that the tool may not be secure.
Anyone using Truecrypt should migrate to another encryption program as soon as possible; BitLocker for Windows or FileVault 2 for Mac are recommended.
IMPORTANT: Only Secure Email is approved for encryption of email attachments. Do not use another program to encrypt or password protect attachments.
Secure Email Gateway
- Website: http://www.winzip.com
- Use: File and Folder Compression software
- Cost: Free for Columbia faculty and staff via http://cuit.columbia.edu/winzip-pro, otherwise please see the WinZip website.
- Encryption: Standard Zip 2.0 and AES-128 & 256 bit
Do not rely on Zip 2.0 encryption to provide strong data security
WinZip's implementation of the AES algorithm has been FIPS-197 certified by NIST.
- Password: Yes, files can be password protected.
- Usage: See the WinZip website or information on the CUIT website.
- Website: http://office.microsoft.com
- Use: Encryption of individual files (Word documents, Excel spreadsheets, etc.)
- Cost: Included with Office
- Encryption: AES-128/256 encryption
- Password: Yes, files can be password protected
- Usage: Open or create the file you would like to encrypt. Find the password protection options (Office 2013 and 2010 for Windows go to the File tab - Info - Protect Document - Encrypt with Password; Office 2011 for Mac open Tools - Protection; otherwise use the program's Help menu) and follow the prompts to set a password.
| TOP |