Your laptop gets stolen from a coffee shop. Your cloud provider gets subpoenaed. A backup drive walks out of your office. In every one of these scenarios, the only thing standing between your data and whoever now has it is encryption — if you turned it on. Most folks assume their data is encrypted because they set a login password. That’s not encryption. That’s a screen lock. The data on the disk is still sitting there in plaintext, readable by anyone who pulls the drive and plugs it into another machine.

Encryption is the difference between a stolen laptop being an inconvenience and a stolen laptop being a catastrophe. Here’s what to actually turn on, what tools to use, and what “encrypted” really means when the corporate giants throw the word around in their marketing.

DO / DON’T

DO:

DON’T:

Full Disk Encryption

Full disk encryption (FDE) encrypts everything on your drive — operating system, applications, temporary files, swap space. If the device is powered off and someone pulls the drive, they get noise. Nothing readable.

Windows — BitLocker

Path: Settings > Privacy & security > Device encryption or search “BitLocker” in the Start menu.

macOS — FileVault

Path: System Settings > Privacy & Security > FileVault

Linux — LUKS

File and Folder Encryption

Sometimes you need to encrypt specific files rather than the entire disk — especially before uploading to cloud storage where someone else controls the infrastructure.

VeraCrypt

VeraCrypt is the successor to TrueCrypt (which was abandoned under mysterious circumstances in 2014). It creates encrypted containers — virtual encrypted volumes that mount as drives. You can also encrypt entire partitions or create hidden volumes for plausible deniability.

7-Zip (Encrypted Archives)

For quick file encryption, 7-Zip supports AES-256 encrypted archives. Right-click a file or folder, create a .7z archive with a password. It’s not as robust as VeraCrypt for ongoing use, but it’s effective for encrypting files before email or upload.

Email Encryption

Email was designed in the 1970s with zero consideration for privacy. By default, emails traverse the internet in plaintext, readable at every hop.

PGP/GPG

GnuPG implements the OpenPGP standard. You generate a key pair, share your public key, and anyone with it can encrypt messages that only your private key can decrypt. Tools like Thunderbird have built-in OpenPGP support.

The honest assessment: PGP email encryption works, but it’s a usability nightmare for most folks. Key management is complex, key discovery is fragile, and one mistake — like replying without encryption — exposes the thread. For most people, encrypted messaging apps (Signal) are more practical than encrypted email.

S/MIME

S/MIME uses X.509 certificates (the same PKI infrastructure as HTTPS) for email encryption and signing. It’s more integrated into corporate email clients (Outlook, Apple Mail) but requires obtaining a certificate from a CA. More seamless than PGP if your organization supports it.

TLS Configuration (Server-Side)

If you run any internet-facing service, your TLS configuration matters. NIST SP 800-52 Rev. 2 provides the authoritative guidance.

Test your configuration with SSL Labs. Aim for an A+ rating.

Database Encryption

Transparent Data Encryption (TDE)

TDE encrypts database files at rest. SQL Server, Oracle, and PostgreSQL all support it. The encryption is transparent to applications — they don’t need to change. But understand what TDE does and doesn’t protect: it protects data on disk. It does not protect data in memory or in transit. A DBA with query access can still read everything. TDE stops the “stolen backup tape” threat, not the “insider with credentials” threat.

Application-Level Encryption

For truly sensitive fields (SSNs, credit card numbers, health records), encrypt at the application layer before the data hits the database. This means even a compromised DBA or database dump reveals only ciphertext. The tradeoff: you lose the ability to query or index encrypted fields. There’s no free lunch.

What “Encrypted” Actually Means in Cloud Marketing

When a cloud provider says “your data is encrypted at rest,” ask two questions: who holds the keys? and encrypted from whom?

If the provider holds the encryption keys, they can decrypt your data. That means they can comply with subpoenas, government requests, or be compelled to hand over your data in plaintext. “Encrypted at rest” with provider-managed keys protects you from a physical disk theft at the data center. It does not protect you from the provider, their employees, or anyone with a court order.

Customer-managed keys (AWS KMS with customer-managed CMKs, Azure Key Vault BYOK, GCP Customer-Managed Encryption Keys) shift key control to you. Better. But the keys still exist within the provider’s infrastructure during encryption/decryption operations.

Client-side encryption — where you encrypt data before it ever reaches the cloud — is the only model where the provider truly cannot access your plaintext data. Services like Cryptomator for cloud storage or age for file encryption give you this.

The bottom line: encryption you don’t control the keys to is encryption that protects someone else’s liability, not your data. Know who holds the keys. That’s the whole game.