top of page
Decorative

TeraCryption delivers encrypted files from Explorer to Explorer. Say goodbye to insecure emails.



A few days ago, a consultant looking for business offered to send me a confidential market analysis via what he called an “encrypted email”; those were his words. Later, I received a regular email with a button to click. I hesitated because this is a typical phishing trap for hackers to get into our network. I had to verify if his company was legitimate, and I spent time evaluating whether I should click the link to read his appealing verbal offer. This verification process interrupted what I was working on at that time.


The link opened a webpage asking for my email and to create a password.  After I complied, their system sent me another email with a verification code, which I entered. Next, another webpage appeared, asking me to download a PDF file, which I did.


My frustration peaked when I discovered the supposedly secure PDF was not encrypted. It was completely unprotected. What was the point of the elaborated steps to access a 'secure portal' if the end result was a vulnerable secret file? The portal itself might have been secure, but it was clear that the files stored within were not. This was a glaring oversight, a critical risk to file protection. It made me question the point of such intricate methods if they ultimately lead to vulnerability. Many who have experienced similar situations likely share this disappointment and frustration.


The truth is that a sensitive file can never be truly secure unless it is and remains encrypted at all times, whether at rest or in transit, in their cloud servers, or on my computer. The challenge has always been how to share these encrypted files easily. Users are forced to invest valuable time exchanging the corresponding encryption keys to open the files using a third-party encryption application. This manual decryption and encryption process derails business thoughts and discourages executives from using encryption in the company due to lost time and productivity. It's a time-consuming task that demands a certain level of computer training. However, the need for companies to protect sensitive files with encryption is urgent and cannot be ignored.


Unencrypted files in “secure portals” risk being accessed by unintended recipients if the link is sent to the wrong email address or after downloading. It's clear that these “secure portals” do not protect the file by encrypting it. I agree that “secure portals” are a way to transport and deliver files. However, the sensitive files are not protected when stored in their cloud or after being downloaded.


TeraCryption is a business file encryption system in which authorized executives use the TeraKey application installed on their Windows 10/11 computer to encrypt files in seconds from the moment they are created.  Authorized executives in the company using TeraKey can exchange encrypted files using their explorer.  For example, John, the sales agent, and Mary, the sales Manager, can see the same folder named “Sales” on their respective Explorer. John can drag and drop a file into the “Sales” folder that will be encrypted, appearing in seconds in the “Sales” folder in Mary’s Explorer. There is no need to send the file by email, and the file remains encrypted all the time.


Assume you are a lawyer and must exchange sensitive divorce documents with a client, ALPHA, during trial preparation and consulting. Have your client install the TeraKey application on their Windows 10/11 computer (your client can call TeraCryption support for assistance). It takes no more than 10 minutes.  Your client will log in using secret credentials verified by receiving a code on their phone. Once logged in, your client will find a folder in Explorer called ALPHA. You can drag and drop a sensitive document into the ALPHA folder on your Explorer. The document will be encrypted in seconds and appear inside the ALPHA folder on your client’s Explorer. For example, your client can double-click on your Word file, which will be decrypted and opened on their computer. 


Your client can edit, add a picture, or change the text style. When finished, your client saves and closes the file. A few seconds later, the edited encrypted file appears in your Explorer's ALPHA folder. TeraCryption provides encrypted file communication from Explorer to Explorer without using email.


For ZERO TRUST file encryption security, the encrypted file inside the ALPHA folder can only be accessed by the correct authorized user, who must log in to TeraKey with the proper credentials and enter the code sent to their phone.


TeraCryption is a business file encryption system that allows communication of encrypted files between any number of executives and clients. The system can accommodate five or hundreds of executives and clients. To store encrypted files, you can organize documents in folders labeled with your clients' names. One or more executives can be assigned to deal with multiple clients.


We invite you to a 30-minute live demonstration to see TeraCryption in action.  Click HERE FOR DEMO to select a day and time that is convenient for you. We will show you a fantastic way to protect files with unbreakable encryption. For detailed information, visit www.teracryption.com and learn more about TeraCryption's operation and applications.  You can email us at sales@teracryption.com with any questions.

 

Jorge D. Fernandez is the President and CEO of TeraCryption Corporation, the cybersecurity division of Canamex Communications Corporation. Mr. Fernandez graduated as a communications and electronic engineer from the National Polytechnic Institute in Mexico. Mr. Fernandez has obtained several US and Canadian patents for unique technological breakthroughs in the companies’ products, services, and systems applications. Mr. Fernandez actively participates in the growth and expansion of TeraCryption using his experience in secure critical messaging and sensitive file communications collected throughout the years in business. Email jorge.fernandez@teracryption.com if you need to achieve special file encryption requirements or file protection regulatory compliance.

 

Comments


bottom of page