Media & Resources

Data Encryption in Healthcare

  • 10-21-2016

Encryption in Healthcare

The Right Prescription for Maintaining Compliance with Patient Security Regulations

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops. Only after the laptops were stolen did it come to light that they contained over 1 million unencrypted patient records — a clear HIPAA violation. The provider ended up settling a class action suit for $3 million, but plenty of other healthcare providers have felt the sting of failing to comply with HIPAA, as well. The next major data breach isn’t a matter of if, only when.

Apricorn Aegis Secure Key 3.0 Review – Data Protection For Every Security Need

  • 08-01-2016
  • Les Tokar

If you are like I, you work in an environment where you may be provided an encrypted laptop in which you have no administrative permissions.  My work laptop requires a hardware encryption password followed by a secure OS password and recognition of the inserted security card.  If you want to utilize all but very few secure USB flash drives, read article

New Aegis Secure Key 3.0 480GB Encrypted Thumb Drive

  • 03-22-2016
  • Store Owner

The Aegis Secure Key Now Offers a 480GB--the Highest Storage Capacity of any Hardware-Based Encrypted Flash Key on the Market.

 Poway, CA – March 22, 2016 – Apricorn (

Enter the PIN and Plug It In

  • 09-16-2015
  • Eric Jacksch

USB flash drives are an efficient and popular way to move data between computers and backup important files. With capacities of 480GB available on store shelves, immense amounts of data can be carried on a device smaller than one’s thumb. But if a USB drive is lost or article

IRS agent misplaces flash drive containing data on nearly 12,000 Katy ISD employees

  • 09-02-2015
  • Store Owner

Katy Independent School District (ISD) in Texas is notifying nearly 12,000 current and former employees that an Internal Revenue Service (IRS) agent misplaced a portable flash drive containing their personal information while conducting a random audit under the direction of the IRS.

(read article)

Embedded Software-Free Authentication vs. Software Host-Based

  • 06-26-2015
  • Store Owner



In any market where IP owners value the security and safeguarding of data, it may be preferable to move files on encrypted flash drives rather than over the public Internet and well-traveled networks. Such flash drives will let the user authenticate his or her identity either with software via an application that runs on the host system or without software. Both approaches have their respective pros and cons. In this paper, we will explore the merits of both flash drive models and recommend which user priorities will be best aligned with each drive type.

New Feature Spotlight:
Forced Enrollment

  • 06-26-2015
  • Store Owner

What is Forced Enrollment

Generally speaking, the weakest links in any data security plan are the access codes or PINs. It’s common knowledge that PINs that are too simple are about as effective as having no PIN at all. Forced Enrollment focuses on a different PIN weakness. One that stems from devices shipped with factory preset PINs. While factory preset PINs are common and widely used, there exists a very real opportunity to skip the factory PIN replacement step and put these drives into service with publicized PINs still enabled to authenticate them. Most people know that the preset PIN has to be changed at initial setup, but surprisingly, there are a few who don’t. To ease the minds of CISOs everywhere, we’ve sidestepped this potential vulnerability by eliminating the factory-preset PIN on the Secure Key 3.0 altogether. And since all of the Secure Key’s use and setup requires a 7-16 digit PIN to unlock it, the establishment of a unique admin PIN has to happen first, which is exactly what Forced Enrollment ensures. Simply put, we’ve taken the critically important security measure of unique PIN creation a step further by forcing this process to the very front of the Secure Key’s setup.

New Feature Spotlight:
Dual Read-Only Modes

  • 05-28-2015
  • Store Owner

Why is "Modes" Plural?
Because the Secure Key 3 has a separate Read-Only mode for both the Administrator as well as the User, expanding its functionality after deployment in the field. Prior to deployment, the Secure Key's Admin can set the drive to be Read-Only. After deployment, the User can also set the drive to Read-Only as well.

Portable storage for the paranoid: We test two secure USB drives on keypad vs. software security

  • 04-06-2015
  • Store Owner

Congratulations: You’ve decided your data is sensitive enough (or you’re paranoid enough) to store it on a secure USB drive. Basically encrypted storage on a stick, these portable flash full articlepc world logo

Aegis Secure Key 3.0 - Another Upgrade from Apricorn. More Secure Than Fort Knox?

  • 03-30-2015
  • digital reviews

digitalreviewslogoWe highly recommended that little critter for its security in such a tiny USB key package...this time around it sports USB 3.0, it's a bootable drive and Read Full Article

91-100 of 153