Media & Resources

Data Encryption in Government

  • 11-23-2016

Encryption in Government

Make the Rules, Play by the Rules

Few entities possess as much personal information as the U.S. government. In 2015, the Internal Revenue Service processed over 150 million tax returns, and the Social Security Administration paid benefits to nearly 60 million Americans. In a sense, the government lays the foundation for every U.S. citizen’s personal data the moment each person receives his or her Social Security number.

Data Encryption in Finance

  • 11-03-2016

Encryption in Finance

Regulatory Compliance Is Always a Smart Investment

Today, encryption is a staple of the professional world, as virtually every industry that deals with personal and/or sensitive data relies on encryption to protect that data. Those that don’t encrypt put themselves at risk for stiff government penalties, fines, lawsuits, and more.

Data Encryption in Education

  • 10-27-2016

Data Encryption in Education

Educational Institutions at High Risk for Costly Data Breaches

The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets. In fact, the education vertical tied for 2nd place in Symantec’s 2016 Internet Security

Data Encryption in Healthcare

  • 10-21-2016

Encryption in Healthcare

The Right Prescription for Maintaining Compliance with Patient Security Regulations

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops. Only after the laptops were stolen did it come to light that they contained over 1 million unencrypted patient records — a clear HIPAA violation. The provider ended up settling a class action suit for $3 million, but plenty of other healthcare providers have felt the sting of failing to comply with HIPAA, as well. The next major data breach isn’t a matter of if, only when.

Apricorn Aegis Secure Key 3.0 Review – Data Protection For Every Security Need

  • 08-01-2016
  • Les Tokar

If you are like I, you work in an environment where you may be provided an encrypted laptop in which you have no administrative permissions.  My work laptop requires a hardware encryption password followed by a secure OS password and recognition of the inserted security card.  If you want to utilize all but very few secure USB flash drives, read article

New Aegis Secure Key 3.0 480GB Encrypted Thumb Drive

  • 03-22-2016
  • Store Owner

The Aegis Secure Key Now Offers a 480GB--the Highest Storage Capacity of any Hardware-Based Encrypted Flash Key on the Market.

 Poway, CA – March 22, 2016 – Apricorn (www.apricorn.com)

Enter the PIN and Plug It In

  • 09-16-2015
  • Eric Jacksch

USB flash drives are an efficient and popular way to move data between computers and backup important files. With capacities of 480GB available on store shelves, immense amounts of data can be carried on a device smaller than one’s thumb. But if a USB drive is lost or ...read article

IRS agent misplaces flash drive containing data on nearly 12,000 Katy ISD employees

  • 09-02-2015
  • Store Owner

Katy Independent School District (ISD) in Texas is notifying nearly 12,000 current and former employees that an Internal Revenue Service (IRS) agent misplaced a portable flash drive containing their personal information while conducting a random audit under the direction of the IRS.

(read article)

Embedded Software-Free Authentication vs. Software Host-Based

  • 06-26-2015
  • Store Owner

Summary:

 

In any market where IP owners value the security and safeguarding of data, it may be preferable to move files on encrypted flash drives rather than over the public Internet and well-traveled networks. Such flash drives will let the user authenticate his or her identity either with software via an application that runs on the host system or without software. Both approaches have their respective pros and cons. In this paper, we will explore the merits of both flash drive models and recommend which user priorities will be best aligned with each drive type.

New Feature Spotlight:
Forced Enrollment

  • 06-26-2015
  • Store Owner

What is Forced Enrollment

Generally speaking, the weakest links in any data security plan are the access codes or PINs. It’s common knowledge that PINs that are too simple are about as effective as having no PIN at all. Forced Enrollment focuses on a different PIN weakness. One that stems from devices shipped with factory preset PINs. While factory preset PINs are common and widely used, there exists a very real opportunity to skip the factory PIN replacement step and put these drives into service with publicized PINs still enabled to authenticate them. Most people know that the preset PIN has to be changed at initial setup, but surprisingly, there are a few who don’t. To ease the minds of CISOs everywhere, we’ve sidestepped this potential vulnerability by eliminating the factory-preset PIN on the Secure Key 3.0 altogether. And since all of the Secure Key’s use and setup requires a 7-16 digit PIN to unlock it, the establishment of a unique admin PIN has to happen first, which is exactly what Forced Enrollment ensures. Simply put, we’ve taken the critically important security measure of unique PIN creation a step further by forcing this process to the very front of the Secure Key’s setup.

21-30 of 86