Media & Resources
- Banking Exchange, Steve Cocheo
How clean is that device you are about to stick in your company computer? (read online article)
- Government and Public Sector Journal, Jon Fielding
Without question, mobile and remote working offers huge business benefits, but it also exposes organisations to risks that can be... read full article
- InfoSecurity Magazine, Tara Seals
A full 87% of employees surveyed have lost a USB drive and failed to notify their company. A recent survey from Apricorn of more than 400 IT professionals from industries including... (read more)
- betanews, Ian Barker
Security polices for USB devices are frequently outdated and inadequate, and enterprises are often failing to (read online article)
- SCMagazineUK, Jon Fielding
Organisations should create an environment where people feel comfortable discussing data security. If you can create a culture that ...(read more)
- Jon Fielding
It’s not surprising that the legal sector represents a goldmine for hackers; it is a vital component of UK business and government infrastructure.(read full article)
- Store Owner
Katy Independent School District (ISD) in Texas is notifying nearly 12,000 current and former employees that an Internal Revenue Service (IRS) agent misplaced a portable flash drive containing their personal information while conducting a random audit under the direction of the IRS.
- digital reviews
We highly recommended that little critter for its security in such a tiny USB key package...this time around it sports USB 3.0, it's a bootable drive and Read Full Article
- Computer World
Apricorn Aegis Secure Key 3.0
Left your tablet in the cab?
With enough time and the right
skills, someone could access that
data, even if it's password-protected... read full article
- Store Owner
What is Programmable Brute Force?
After a programmable number (up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless.