🔐 Encryption & Secure Storage

Protect Data at Rest & In Transit (HK PDPO Compliant)

Updated 2026 Edition

Why Encrypt?

Encryption turns your data into unreadable ciphertext. Without the key (password/certificate), the data looks like random noise. This is critical for complying with the Hong Kong PDPO (Principle 4).

💾 At Rest (Storage)

Protects files sitting on your hard drive or USB. If the device is stolen, the thief cannot read the data.

📡 In Transit (Network)

Protects data moving over the internet (e.g., HTTPS, VPN). Prevents hackers on public Wi-Fi from intercepting passwords.

🔑 Key Management

Critical Concept: If you encrypt data but lose the password (Key), the data is gone forever. There is no "Backdoor."

🇭🇰 Hong Kong PDPO Tip:
If a laptop containing unencrypted personal data (HKID, phone numbers) is lost, it is a significant data breach that may require reporting to the PCPD. If it was encrypted, it might not be considered a breach because the data is inaccessible.

Find Your Encryption Tool

Select your needs to compare recommendations tailored for 2026.

Step 1: What are you securing?

Step 2: Who is it for?

Mobile Encryption (Android & iOS)

Smartphones carry our most sensitive data. Encryption is usually "On" by default, but it relies entirely on your Passcode strength.

OS Feature Action Required Cost
iOS (iPhone) Data Protection Use a 6-digit PIN or Alphanumeric code. 4-digits are too easy to brute-force. Enable "Erase Data after 10 failed attempts" for max security. Free
Android File-Based Encryption Ensure specific apps (Banking, Signal) are using biometric locks. Do not use "Pattern" unlocks (easy to spy over shoulder). Free
MDM (SME) Remote Wipe For Companies: Use Mobile Device Management (MDM) to force encryption and allow "Remote Wipe" if an employee loses a phone. ~$15/mo
🎓 Student Note: "Encryption" on a phone only works when the screen is locked. If you hand your unlocked phone to someone, encryption does not protect you. Set your screen timeout to 30 seconds!