FAQ

Why should I use The CyberAngel® with Wi-Trac Software?

  • 10% of laptops are stolen within the first 12 months of purchase
  • 49% of companies have had laptops stolen within the last 12 months
  • 25% of all “reported breaches” involved missing laptops
  • 60% of all corporate data assets reside on unprotected PC’s
  • All 19 Federal Government Departments & Agencies reported at least one loss of personally identifiable information since January 2003
  • The vast majority of data loss arose from physical thefts of portable computers, drives, and disks, or unauthorized use of data by employees
  • Since January 2005, there have been 109 reported computer-related security breaches at educational institutions.
  • Of the 113 data breaches reported in 2005, 55 took place at universities, and university related medical centers
  • Total cost to recover from a data breach averaged $140.00 per lost record
  • 19% of the victims of a data breach terminate their relationship with the Company

Every corporation in America today is concerned with security and the liability of not providing enough security to its clients and employees.  For organizations that use personal electronic records to handle non-public customer information, the need to protect that data has never been greater.  Identity theft has reached epidemic proportions.

The CyberAngel with Wi-Trac offers a comprehensive set of security features that provide User Authentication, Data Protection, Remote Access Restriction, and Tracking and Recovery of lost or stolen computers.  We ensure that the confidential information is encrypted and secure at time of boot-up, and proper Authentication allows full access to that machine.  Violation of the Authentication keeps that information encrypted and hidden from view, prevents remote access from that computer back to a network or an online account, and provides location information to our Security Monitoring Center to use in the recovery of that stolen asset.  The CyberAngel with Wi-Trac can help keep you in compliance with existing and new data / privacy laws and provide your end-users with the ability to recover their stolen assets.  Our Wi-Trac technology is the only available product that can track a computer through a wireless network.  With this increase in Privacy and Security Breach laws, and the over 50% wireless penetration of suburban America, The CyberAngel with Wi-Trac just makes sense as an effective tool for Data Protection and Theft Recovery

How does The CyberAngel® with Wi-Trac work?

The CyberAngel® with Wi-Trac utilizes our unique ALERTLOCK, and LOCATE technology to detect unauthorized access of a client’s computer and silently reports the intrusion to The CyberAngel® Security Monitoring Center.  The CyberAngel® with Wi-Trac was designed with stealthiness in mind, and offers maximum protection while being invisible to that unauthorized user, making it virtually impossible to defeat.

Once activated, The CyberAngel® with Wi-Trac will:

  • Alert Users and The CyberAngel in Real-Time during unauthorized access attempts
  • Lock vital information and applications with smart encryption technology
  • Locate notify and recover using the latest in exclusive tracking and recovery technology

“Real-Time Security”  —  Strong User Authentication

The CyberAngel® Authentication offers Fully Integrated and Two-Factor Authentication modes, depending on the level of security required.  Violation of The CyberAngel® Authentication instantly protects the information, data, applications and utilities that you feel are sensitive or critical on that computer.  “Real-Time Security” for your computer and the information contained within.  The CyberAngel® with Wi-Trac will immediately search for some type of connectivity to alert of that violation.

“Real-Time Security”  —  Data and Information Protection

The CyberAngel® Secure Drive protects your confidential data, preventing unauthorized access to your files, company financials, patient / client information, or corporate business plans.  If your computer is stolen, and / or The CyberAngel® authentication is violated—your sensitive data and information is encrypted and protected as well as rendered invisible to that unauthorized user.  This “Real-Time Security” is a solid compliance tool for medical or financial information privacy.  Proprietary applications can also be placed within the Secure Drive, prohibiting their use by an unauthorized user or thief.  The CyberAngel® with Wi-Trac’s “on-the–fly” encryption is transparent and lightning fast, and with all of our security features synced to the Authentication, this comprehensive IT security tool truly provides….“One Computer Program — One Password – 100% Security!

Tracks, Locates and Recovers Lost or Stolen Computers

When The CyberAngel® Authentication is breached at login or boot-up, The CyberAngel® with Wi-Trac’s unique technology covertly transmits an alert to our Security Monitoring Center, where we identify the location from which that computer is calling.  The “unauthorized user or thief” is unaware that an alert is being transmitted.  If that computer has been reported stolen, then our Recovery Team helps coordinate notice to all necessary law enforcement officials and works closely with them to provide a rapid recovery of your stolen computer.  The CyberAngel is the only company to offer Wi-Trac technology, the first indoor / outdoor laptop positioning system that utilizes Wi-Fi to accurately pinpoint the computer location.  With the market today in excess of 80 million portable computing devices, The CyberAngel® with Wi-Trac is the best possible way to locate stolen assets.

Additional “Real-Time Security” Features

Provides Strong User Authentication
Single & Two-Factor Authentication provides flexibility within an organization for secure access to any computer

Prohibits Unauthorized Remote Access
Prevents VPN technologies from operating—-prohibiting access to your remote network

Prevents Unauthorized Application Use
Prohibits applications placed in the Secure Drive from operating—protecting such financial programs as Quicken, Peachtree, or databases such as ACT or Goldmine

Locks Communication Ports
Prevents unauthorized use of any Dial-up Networking utility—preventing access to your remote network server or online accounts

Notification of Unauthorized Access
Provides immediate notification (via e-mail and / or fax) of any unauthorized access attempts—allows for rapid response to track and locate breaches in security

Will The CyberAngel® with Wi-Trac work on my computer?

The CyberAngel® with Wi-Trac will work on IBM compatible PC machines, Pentium II, 333 Mhz or better with a minimum of 128 Mg of memory that is running any version of Windows®  NT 4.0, Windows® 2000 and Windows® XP.

How and when do I enter The CyberAngel® Authentication?

Once you have successfully registered, The CyberAngel® with Wi-Trac will begin protecting your system.  After successful registration, each time you turn on your computer or reboot your system, simply type in your CyberAngel® password to be authenticated.  The CyberAngel® with Wi-Trac is pre-configured to launch in the Two-Factor Authentication Mode.  This means that after a successful Windows® / Network login, you will see another password box that will appear, and you will need to enter your CyberAngel® password that you selected during registration.  You can use the standard prompted password each time, or for maximum protection, select our unprompted password feature.  The Single Factor Authentication Mode allows you to link The CyberAngel® with Wi-Trac to your Windows® / Network login, so that a successful Windows® / Network login will launch The CyberAngel® with Wi-Trac in the authenticated mode, and will allow you full access to that computer.  To change to the Single Factor Authentication Mode, please contact our Security Monitoring Center at 1.800.501.4344 and ask for technical support.  They will help you change your Authentication Mode and ensure proper operation.  Please make sure that you have your installation CD available for re-configuration.

With the Two-Factor Authentication Mode you have three (3) attempts to successfully enter the prompted password, and one (1) click of the mouse outside of the CyberAngel® password box will violate the system.  In the unprompted password mode, you only have one (1) attempt at successful password entry, and one (1) click of the mouse before password entry will violate the system.  If violation in unintentional, simply reboot the computer and correctly enter the password when prompted or required.

In the Single Factor Authentication Mode, successful entry of your Windows® / Network login will authenticate you into that computer, and no secondary authentication will be required.

Note:  In the Single Factor Authentication Modeanyone that enters a valid Windows® / Network login will have full access to your computer and files contained within The CyberAngel® Secure Drive.  We recommend the Two-Factor Authentication Mode for a higher level of security, and is why we have set it as the default configuration.

How does The CyberAngel® with Wi-Trac alert the Security Monitoring Center if my computer has had an unauthorized access?

When The CyberAngel® Authentication is violated; the software will immediately look for any type of connectivity (Cable Modem, DSL, LAN, WAN, WiFi, or phone modem) and silently communicate with our Security Monitoring Center, providing the IP address / Phone number from where it is calling in from.  Upon violation, access to the COM ports is restricted for the “unauthorized user or thief”.  This will affect any COM device, such as a modem, signature tablet, and communications to mobile devices like PDA’s, Pocket-PCs, and Smart-Phones.  This prevents the unauthorized user from using your computer in an unauthorized manner, and gaining access to your personal or business online accounts or transfer information to a PDA, Pocket PC, or Smart Phone.

Won’t the unauthorized user hear the sound of the modem dialing when it alerts The CyberAngel® Security Monitoring Center?

No.  The CyberAngel® with Wi-Trac turns off the modem speaker when dialing The CyberAngel® Security Monitoring Center.  Network communication (Cable Modem, DSL, WiFi, LAN or WAN) is already silent and invisible to the user.  This makes the alert undetectable by the unauthorized user.

What if the unauthorized user connects the computer to a phone line that requires a prefix ( 8, 9, etc.) to dial out?

During an Alarm Event, The CyberAngel® with Wi-Trac attempts all dialing options (1-800, 9,1-800, 8,1-800) in order to computer a notification regardless of the choice made during registration.  It also simulates the 2 most popular PBX prefixes in the event the computer is dialing from a business, motel, or other location using a large telephone system.

Does The CyberAngel® with Wi-Trac work over a Network, LAN or WAN, Cable Modem, DSL or WiFi?

Yes.  If your corporate network, LAN or WAN, has a dedicated TCP/IP connection to the Internet, and you have a connection to that network at your workstation, your computer can communicate with to The CyberAngel® Security Monitoring Center for registrations and alarm events.  Cable modems, WiFi networks and DSL circuits also provide connections to the Internet, thus allowing registration and alarm event transmission.

How do I Re-Arm The CyberAngel® with Wi-Trac if I walk away from my computer?

By utilizing a unique Hot Key combination, you can re-arm The CyberAngel® with Wi-Trac ware as need requires.  Simply press Alt + Shift + Space Bar to re-arm The CyberAngel® With Wi-Trac.  By utilizing The CyberAngel® Configuration Manager, you can change the hot key combination to something that might better fit your needs.  When you return to your computer, type in your password to disarm The CyberAngel® with Wi-Trac.  You can also re-arm The CyberAngel® with Wi-Trac while in an application or file, without losing any data.  You cannot, however, re-arm if The CyberAngel® with Wi-Trac is violated.

How does The CyberAngel® with Wi-Trac contact me if my computer has had an unauthorized access?

During registration of The CyberAngel® with Wi-Trac Software, you can select either E-mail or Fax for your notification preference.  Once The CyberAngel® Security Monitoring Center receives an alert, a notification is automatically generated noting the Date and Time of the unauthorized usage, the registered User Name and User I.D. number, and a message that informs you of that unauthorized usage.  You can add or change that notification path at any time, simply contact the Security Monitoring Center at 1.800.501.4344 and provide your Authentication Code to the Support Operations Engineer to verify your identity and account information.

How does The CyberAngel® with Wi-Trac locate my stolen computer through a wireless network?

When The CyberAngel® Authentication is breached at login or boot-up, The CyberAngel® with Wi-Trac will look for all wireless networks in range, capture the MAC address of the wireless router and signal strength, and transmit that data back to our Security Monitoring Center.  Our unique location technology will use that information to triangulate the position down to a longitude / latitude, usually within less than 30 feet.  The CyberAngel® With Wi-Trac’s technology silently transmits an alert to our Security Monitoring Center, where we identify the location from which that computer is calling.  The “unauthorized user or thief” is unaware that an alert is being transmitted or that the wireless information is being gathered.  The CyberAngel® Recovery Team helps coordinate notice to all necessary law enforcement officials and works closely with them to provide a rapid recovery of your stolen computer.

Will I be locked out of my modem and computer if I accidentally put in the incorrect password?

If The CyberAngel® with Wi-Trac is accidentally violated (forgot to enter password, password typo, etc.) resulting in your communications ports being locked and your Secure Drive being inaccessible, simply reboot your computer and enter in the correct password at the proper time.  Then proceed as normal with your computer operations.

What happens if I mistype the password?  Do I get a second chance?

With the Two-Factor Authentication Mode you have three (3) attempts to successfully enter the prompted password, and one (1) click of the mouse outside of the CyberAngel® password box will violate the system.  In the unprompted password mode, you only have one (1) attempt at successful password entry, and one (1) click of the mouse before password entry will violate the system.  If violation in unintentional, simply reboot the computer and correctly enter the password when prompted or required.

In the Fully Integrated Authentication Mode, successful entry of your Windows® / Network login will authenticate you into that computer, and no secondary authentication will be required.

What happens if I forget my password?

Call The CyberAngel® Security Monitoring Center at 800.501.4344 and provide your Authentication Code to the Support Operations Engineer to verify your identity and account information.  Once verified, the Support Operations Engineer will then provide you with your current password.

What if my E-Mail Address or Fax Number changes?  Can I change or update my notification preference?

Call The CyberAngel® Security Monitoring Center at 800.501.4344 and provide your Authentication Code to the Support Operations Engineer verify your identity and account verification.  Once verified, they will log the requested change and your account information will be updated as soon as possible, no longer than 24 hours.

What do I do if my computer has been stolen?

Should you need to report a stolen computer, call our Security Monitoring Center at 1.800.501.4344 and select 6 to be transferred to our Stolen Computer Hotline.  You must provide your Authentication Code to the Support Operations Engineer to verify your identity and account information.  A member of The CyberAngel® Recovery Team will then gather additional information about your computer, details of the theft, and obtain the police report number and contact information for your local authorities.  Your computer will be tagged as stolen and any subsequent activity will generate a Security Incident Report.  The CyberAngel® Recovery Team will then contact that local enforcement agency to notify them that The CyberAngel® with Wi-Trac is active on that stolen computer, and obtain immediate response contact information in preparation for when we receive an alarm event from that stolen computer.  The Security Incident Report will provide them with the date and time of the alarm event, the phone number or IP Address from where your computer has alerted our Security Monitoring Center, the name and address associated with that number, as well as other locating information.  It is the sole responsibility of the user to contact the local authorities and report any theft.

Can I change the set-up of The CyberAngel® with Wi-Trac?

The CyberAngel® Configuration Manager will allow you exploit the full power and versatility of The CyberAngel® with Wi-Trac.  You must use your original CD-ROM and enter your current password in order to access the Configuration Manager.  The CyberAngel® Configuration Manager will allow you to change the password prompt mode, toggle the Input Lock (keyboard and mouse lock) from Un-Locked to Lock mode, to enable or disable The CyberAngel® with Wi-Trac  (if your computer needs to be sent in for repair), or to uninstall.  To change to the Fully Integrated Authentication Mode, please contact our Security Monitoring Center at 1.800.501.4344 and ask for technical support.  They will help you change your Authentication Mode and ensure proper operation.  Please make sure that you have your installation CD available for re-configuration.

Can an unauthorized user bypass The CyberAngel® with Wi-Trac by using a boot floppy or booting to DOS?

By utilizing The CyberAngel® Secure Drive, files and information are protected when access is attempted through DOS or a boot floppy.  The CyberAngel® with Wi-Trac never leaves data unencrypted on the hard drive, regardless of whether it is in a directory, the recycle bin, or in the temp or swap files.

Can The CyberAngel® with Wi-Trac be installed over a network to several computers from a network server?

The Systems Administrator has the option to map the installation CD-ROM from a file server or a network Drive so that all end-users machines can install from a central location.  They can also run a script that would launch the registration process the next time that user logged onto the network, forcing registration.  The Implementation Survey session would identify roll-out options, including preloaded information to streamline the registration process.  Several pre-load options exist, including loading enterprise specific and / or end-user specific information.

Does The CyberAngel® with Wi-Trac restrict use of Internet Web Sites?

If the proper password is not entered, access to the Internet via a dial up modem connection is prohibited.  This is an excellent program to help monitor a child’s access and activity on the Internet.

What if my Corporation has a Firewall?  Will The CyberAngel® with Wi-Trac still work over the Internet?

If you have trouble registering our software over a network TCP/IP Internet connection, it might be a result of a firewall providing security for your network.  We do not wish to have you re-configure your firewall just for an evaluation, so we recommend registering via modem.  During the Implementation Survey session, we will identify any firewall issues and work closely with your Firewall Administrator to change any needed permissions.

What is the “Input Lock” feature?

This feature allows you to lock your keyboard and mouse, preventing any access past your desktop.  This is more a desktop feature than a laptop feature, but can be used on either type of computer.  Initially, the software will be configured in the un-lock mode of operation.  However, if you select the Lock mode, your keyboard and mouse will become inoperative when password entry is unsuccessful.  In order to release the keyboard and mouse so that you can close any files that might be open and perform a proper shutdown of the computer, you must enter your CyberAngel® Authentication correctly.  This will release the keyboard and mouse but will not unlock the COM ports or abort the alarm event.  To reset The CyberAngel® with Wi-Trac, you will need to restart your computer and enter your CyberAngel® Authentication.  This feature only works in the Two-Factor Authentication Mode.

How does The CyberAngel® with Wi-Trac Secure Encryption feature works?

The CyberAngel® with Wi-Trac has been designed to be easy and simple for anyone to encrypt and protect sensitive or confidential data.  The CyberAngel® Secure Encryption feature requires that the files and data to be protected reside in a designated area on your hard drive.  This is accomplished by creating a secure space on your hard drive otherwise known as a virtual drive, which looks and acts like any other drive on your computer.  When you install The CyberAngel® with Wi-Trac, your Secure Drive (or volume) is automatically created and designated for you and is named ( Protected [P:] )  Once created, all your data and files stored or deposited into The CyberAngel® Secure Drive are automatically saved and stored immediately as encrypted data and can only be seen and used when the correct CyberAngel® Authentication is entered at boot-up or log in.

How do I get my files into the secure area?

Once initial registration is complete, and you have re-booted your computer, your CyberAngel® Authentication will appear (Two-Factor Authentication Mode).  After you have correctly entered that authentication, open up Windows® Explorer or My Computer to view your drive structure.  You will see your CyberAngel® Secure Drive(Protected [P:]), and you will need to move your important files and folders there in order for them to be protected.  Make sure that when you movethose files, a copy is not left on your original drive.  This would allow unauthorized access to those important files, as well as take up additional space on your computer.

In the Fully Integrated Authentication Mode, successful entry of your Windows® / Network login will authenticate you into that computer, and no secondary authentication will be required.

Once you have moved those files into the CyberAngel® Secure Drive, continue to use the very same tools, utilities and applications that you are already using on a daily basis—there is no need to change the way you work.  Once you enter your CyberAngel® Security Password at boot-up or log in, you have complete access to those files / folders / applications.  Any new files that you save to that volume, or any files from within that CyberAngel® Secure Drive that are updated, are automatically protected the next time The CyberAngel® with Wi-Trac ® is armed.

How large is my CyberAngel® Secure Drive?

The initial size of the CyberAngel® Secure Drive is 2GB.  This size allows the average user ample initial storage for protecting secure and confidential information.  Remember, in most cases, encryption is not intended to encrypt everything on your computer, just your confidential and sensitive information.  The CyberAngel® Secure Drive will grow incrementally as you add documents and fill that initial volume size.  You can use The CyberAngel® Configuration Manager to set a larger size if needed for additional information and data protection.  The CyberAngel® Secure Drive can be as large as 2048GB on Windows NT / 2000 / XP.

Will The CyberAngel® Secure Drive grow in size as I continue to add data?

The CyberAngel® Secure Drive will automatically resize when you exceed 80% storage on that drive.  When you initially place your files into the Secure Drive, you can store up to 95% of the space available (1900MB of 2GB total).  The next time you reboot your computer, if you have exceed 80% of your allocated storage, the Drive will automatically increase by 20%, (400MB).  As you update and add files periodically to that CyberAngel® Secure Drive in the normal use of your computer, the CyberAngel® Secure Drive will automatically increase when you exceed 80% storage levels the next time the computer is rebooted.

Can The CyberAngel® Secure Drive be expanded to protect more data than the initial Drive size allows?

If you need to encrypt an initial amount of information that is larger in size than the initial 1GB size that your protected volume is, you will need to go to The CyberAngel® Configuration Manager, located on your installation CD.  Using your CyberAngel® Authentication, secure entry into the Configuration Manager will allow you the ability to set the size of the CyberAngel® Secure Drive.  Once you have set the initial size capable of handling your confidential information, exit from the Configuration Manager and then reboot your computer.  Upon logging back in and successfully entering your CyberAngel® Authentication, your CyberAngel® Secure Drive will be set at the size you selected.  You can then move, not copy, those files into that secure Drive.

Can I Defrag my Secure Drive?

The CyberAngel® Secure Drive will display as a FAT32 partition.  This partition can be de-fragmented but it should not be reformatted to NTFS as this will disable both the automatic and manual resizing ability and lock the partition at it’s current size.

What happens to my secure files when I uninstall The CyberAngel®?

Using your CyberAngel® Authentication, secure entry into the Configuration Manager will allow you the ability to uninstall The CyberAngel® with Wi-Trac, and will alert you that you have encrypted files.  The Configuration Manager will prompt you to place those files on the drive of your choice.  Select the drive or folder that you want your secure files moved to, select OK to complete the uninstall process.  Once you reboot the computer, The CyberAngel® Authentication will not be active, and your computer and data will no longer be protected.

What encryption algorithm should I use to protect my data?

The CyberAngel® with Wi-Trac defaults to the Rijndael (AES) 128 bit encryption algorithm.  We choose this encryption algorithm because it was selected to be the new U. S. Government Standard, and is a secure, fast, and proven technology.  The other encryption algorithms we offer are also proven technologies, and have different characteristics that make them unique.  We have included basic descriptions of each of the encryption algorithms that The CyberAngel® Security Software offers so that you can make an educated choice.

Rijndael (AES) 128 and 256 bit

The Rjindael algorithm was selected by NIST in October 2000, to become the new official Advanced Encryption Standard (AES) for use within the U.S. Government.  The CyberAngel® with Wi-Trac makes Rjindael available in two key lengths: 128 and 256 bit.  Unlike Blowfish and Twofish, this algorithm takes longer to process at higher key strengths.  The 256-bit version is approximately 40% slower than the 128-bit version.

Blowfish 128 and 448 bit

Blowfish is fast, supports long keys, and is well-respected in the industry.  Blowfish runs nearly 20x faster than DES.  The CyberAngel® Security Software makes Blowfish available in two key lengths: 128 and 448 bit.  Each version runs at the same speed.  The various key lengths are required for compliance with certain export control laws.

Twofish 128 and 256 bit

Twofish was designed by the same scientist who invented the Blowfish algorithm.  Although it has not been around as long as Blowfish nor subjected to the same level of scientific scrutiny, it was a finalist in the NIST competition for choosing a new national encryption standard and is generally regarded as being superior to Blowfish in quality and speed.  The CyberAngel® Security Software makes Twofish available in two key lengths: 128 and 256 bit.

Triple DES

Triple DES is three rounds of DES.  Each round uses a different permutation of your password.  This algorithm is very secure, yet very slow.

DES

DES stands for Data Encryption Standard.  This algorithm has been around for over 25 years and is now believed to be vulnerable to attack since its key size is only 56 bits.

How do I save new files to my secure Drive?

Keep in mind that your CyberAngel® Secure Drive appears to Windows® as another Drive letter.  For many products, saving documents securely is as simple as saving them to the CyberAngel® Secure Drive letter.  On the other hand, products such as Microsoft® Word automatically create temporary recovery files to help you after an unexpected crash.  These type of products require a few extra steps to ensure any temporary information they create are located on the CyberAngel® Secure Drive so your important information is never left in the clear.

Can I configure my programs to automatically save documents and temp files to the secure Drive?

Yes.  You can check your application preference settings to make sure that new and temporary files will be created on the CyberAngel® Secure Drive instead of your standard Drive.  For applications such as accounting, database and e-mail programs, refer to the publisher’s instructions for moving their data files to another Drive – The CyberAngel® with Wi-Trac Secure Drive.

Here are a few of the more popular products and how to set those preferences.

Microsoft® Word

Select the Option item on the Microsoft® Word Tools Menu to display the Options property page, then select the File Location Tab.  Modify the locations of your Document and AutoRecover directories to point to your CyberAngel® Secure Drive.  The Document directory is the default location where Word will suggest to save your new files.  The AutoRecover directory is where Word will create temporary files while you are editing documents to help you recover in the event of a system crash.  You might create a folder within your CyberAngel® Secure Drive called Word Files to store all new documents and then you would the use the file path P:Word Files in the Document and AutoRecover directories.

Microsoft® Excel

Select the Option item on the Microsoft® Excel Tools Menu to display the Options property page, then select the General Tab.  Modify the path in the Default File Location box to point to your CyberAngel® Secure Drive.  All new Excel files will then be saved by default to the CyberAngel® Secure Drive.  You might create a folder within your CyberAngel® Secure Drive called Excel Files to store all new documents and then you would the use the file path P:Excel Files in the Default File Location box.

Microsoft® Outlook

Open the Secure Drive and create a new folder called “Outlook”.  Open Microsoft Outlook and click on File, then Open, then Outlook Data File.  Right click on the Outlook.pst file, then left click on Properties.  Right click on the Location path, (C:\Documents and Settings\……..\Microsoft\Outlook) and left click on Select All, then Right click on the highlighted area and left click on Copy.  Close Microsoft Outlook.

Open My Computer (or Windows Explorer) and paste the path into the Address line and hit enter.  This will take you to the Outlook folders for that User.  Using the center scroll bar, scroll down until the Secure Drive is visible in the left pane.  Click and drag the Outlook.pst file(s) and the .dat file into the Outlook folder in the Secure Drive.  Then delete these files from the old location on the C: drive (in the right pane).  Open Outlook, which will ask you where the .pst file is now located.  Point to the .pst file in the Secure Drive (P:\Outlook\Outlook.pst).  You may have to close Outlook and re-open again to sync up properly.

From then on, you must properly enter your CyberAngel® Authentication to obtain access to your Secure Drive, and thus, your Outlook program.  Violation of your CyberAngel® Authentication will not allow Outlook to run, as that Drive would then be encrypted.

My Documents

Create a folder in the Secure Drive (i.e.  MyProtectedDocuments)  Right click on the My Documents folder on the Desktop.  Left click on the “Properties” button.  Left click on the “Move” button.  Select the folder you created in the Secure Drive.  After clicking OK or Apply, it will ask you if you want to move the contents of “My Documents” from the C: Drive to the Secure Drive.  Select Yes, and it will move all files into the Secure Drive.

Note:  This will also eliminate the need to change the default save location for other programs such as Word or Excel to protect those application documents.

Can you explain encryption to me?

Encryption can often be a confusing subject.  You hear that you need it, but you don’t really understand what it is or how it works.  Encryption is, simply put, the electronic “scrambling” of data or communications.  Think of encryption as building a safe around your data and creating a key to open it.  The difference between strong and weak encryption is directly related to the total possible number of keys that the encryption program is capable of generating; yet, only one will unlock the data safe. The technology employs special mathematical formulas, called algorithms, to render information unreadable without a key to unscramble the encrypted information.  The strength of the algorithm is ultimately measured in the number of bits contained in the key, referred to as bit or key length.  A large bit or key length algorithm is capable of generating a staggering number of possible keys.

How strong is a 128-bit key?  For starters, a 128-bit key has 3.4 x 1038 possible values.  That’s 1021 times stronger than a 56-bit DES key.  The famous “DES Cracker” machines built in the late 1990’s could recover a 56-bit key in a matter of hours.  If this time could subsequently be reduced to one second (meaning trying 255 keys per second), then it would take that same machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit key. To put this into perspective, the universe is believed to be less than 20 billion years old.  Of course, if you need something stronger, The CyberAngel® with Wi-Trac still has you covered; offering two 256-bit ciphers and another at 448-bits.

The unique CyberAngel® Authentication for that computer authenticates that “user”, and allows the proper key to be used to unlock the encrypted data or information.  Using The CyberAngel® with Wi-Trac is as simple as entering your password!

Can The CyberAngel® with Wi-Trac be exported outside the United States?

Recent changes to U.S. export laws with regard to strong encryption now allow products such as The CyberAngel® with Wi-Trac to be freely exported to 23 countries provided that the software publisher has obtained a special license.  CSS, Inc. has been granted the required license to export our maximum strength version.  Please contact us for further information and a list of qualifying countries.

Can The CyberAngel® Secure Drive be backed up on other media?

The CyberAngel® Secure Drive may be safely backed up to other drives or tape.  To do this in a way that remains secure, you must un-map the volume and back up the large secure drive file.  This is the only way your data will be stored in an encrypted format.  If instead, you map your volume and instruct your backup utility to back up the Windows drive letter used by the volume, then the saved files will not be encrypted.

Does The CyberAngel® with Wi-Trac encrypt the entire hard drive?

The CyberAngel® with Wi-Trac does not encrypt your entire hard drive.  The CyberAngel® with Wi-Trac was designed to not only protect (encrypt and make invisible) your confidential files, but to also track and locate your computer if it were ever lost or stolen.  We want the “unauthorized user or thief” to believe that they have a working computer, so that our stealthy software can track and locate your computer and assist law enforcement with recovery.

Does The CyberAngel® with Wi-Trac temporarily decrypt files?

No, The CyberAngel® with Wi-Trac never needs to decrypt files when they are in use.  This is a dangerous concept used by some competing products, which leaves your data in the clear if you have an unexpected system crash or loss of power.

Are all files re-encrypted when passwords are changed?

No.  There is no need to reprocess all the files.

Are The CyberAngel® with Wi-Trac passwords stored on the hard drive?

No.  The CyberAngel® with Wi-Trac passwords exist only in your own head.  Any storing of passwords on hard drives is a major security breach.

Does The CyberAngel® with Wi-Trac support administrative recovery?

The CyberAngel® with Wi-Trac supports administrative recovery of encrypted data using public/private key technologies.  Prior to mass deployment, corporate administrators may optionally embed a specialized public key into the distributable copy of The CyberAngel® with Wi-Trac.  In the event of an emergency, administrative access to the encrypted data can be obtained by using the corresponding administrative private key.

Can The CyberAngel® with Wi-Trac support new encryption algorithms and authentication devices?

The CyberAngel® with Wi-Trac has been designed to facilitate fast integration of new encryption algorithms and authentication devices in response to customer demands.  If you have a corporate or OEM application that would benefit from The CyberAngel® with Wi-Trac encrypted volume technology yet requires special support for third-party software or hardware, please contact CSS, Inc. to discuss your requirements.

Reporting a Stolen Computer

Should you need to report a stolen computer, call our Security Monitoring Center at 1.800.501.4344 and select 6 to be transferred to our Stolen Computer Hotline.  You must provide your Authentication Code to the Support Operations Engineer to verify your identity and account information.  A member of The CyberAngel® Recovery Team will then gather additional information about your computer, details of the theft, and obtain the police report number and contact information for your local authorities.  Your computer will be tagged as stolen and any subsequent activity will generate a Security Incident Report.  The CyberAngel® Recovery Team will then contact that local enforcement agency to notify them that The CyberAngel® with Wi-Trac is active on that stolen computer, and obtain immediate response contact information in preparation for when we receive an alarm event from that stolen computer.  The Security Incident Report will provide them with the date and time of the alarm event, the phone number or IP Address from where your computer has alerted our Security Monitoring Center, the name and address associated with that number, as well as other locating information, including a map to that address.  It is the sole responsibility of the user to contact the local authorities and report any theft.