There may be two possible configurations on your computer at the moment when you are accessing the Internet resources (when the risk of unauthorized access to your data appears):
First, if you have the BestCrypt container mounted - at this moment the BC logical drive looks like any other regular drive on your computer. For instance, all disk utilities could not find the difference between BestCrypt drives and usual hard drives. Therefore, if some Java applet loads on your computer at this moment, it is potentially able to access the data located on the BestCrypt drive. You should use firewall software for full protection.
Second, if all of your BestCrypt containers aren't mounted. In this configuration, all your data stored in the encrypted container are absolutely inaccessible for viewing by any tools. Even if the BC container is stolen by hackers using a network, they won't be able to decrypt the data, because of the strong encryption algorithms implemented in BestCrypt software.
In other words, BestCrypt protects Data at rest and does not protect Data in use.
But Jetico still got you covered! We have developed a solution that will protect Data in use.
Introducing BestCrypt Data Shelter!
Data Shelter can restrict access to your folders and files and quarantine possibly infected applications.
BestCrypt Suit and BestCrypt Volume Encryption already contain Data Shelter in their distributive as a convenient all-in-one solution for your data protection needs. But you can also install it separately.
Learn more about Data Shelter here: https://www.jetico.com/free-security-tools/protect-data-even-when-its-use-bestcrypt-data-shelter