Media & Resources

New Feature Spotlight:
Dual Read-Only Modes

  • 05-28-2015
  • Store Owner

Why is "Modes" Plural?
Because the Secure Key 3 has a separate Read-Only mode for both the Administrator as well as the User, expanding its functionality after deployment in the field. Prior to deployment, the Secure Key's Admin can set the drive to be Read-Only. After deployment, the User can also set the drive to Read-Only as well.

Portable storage for the paranoid: We test two secure USB drives on keypad vs. software security

  • 04-06-2015
  • Store Owner

Congratulations: You’ve decided your data is sensitive enough (or you’re paranoid enough) to store it on a secure USB drive. Basically encrypted storage on a stick, these portable flash drives...read full articlepc world logo

Aegis Secure Key 3.0 - Another Upgrade from Apricorn. More Secure Than Fort Knox?

  • 03-30-2015
  • digital reviews

digitalreviewslogoWe highly recommended that little critter for its security in such a tiny USB key package...this time around it sports USB 3.0, it's a bootable drive and Read Full Article

9 security gadgets for mobile devices

  • 03-30-2015
  • Computer World

Apricorn Aegis Secure Key 3.0

Left your tablet in the cab?
With enough time and the right
skills, someone could access that
data, even if it's password-protected... read full article

New Feature Spotlight:
Programmable Brute Force

  • 03-21-2015
  • Store Owner

What is Programmable Brute Force?
After a programmable number (up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless.

New Feature Spotlight:
Lock Override

  • 01-29-2015
  • Store Owner

What is Lock Override?
 
For security reasons all of our Aegis Secure Drives are designed to automatically lock when they sense a re-enumeration signal from the host.
 
For example, this default setting would prevent a secure drive that is plugged into a powered USB hub, from having the hub plugged into another host without the secure drive locking.

NJ law requires health insurance carriers to encrypt sensitive data

  • 01-13-2015
  • SC Magazine

On Friday, New Jersey Governor Chris Christie signed the legislation which says that health insurance companies “shall not compile or maintain computerized records that include personal information...

read article

Executives concerned about cloud security, report shows

  • 01-13-2015
  • SC Magazine

The security of data in the cloud is a top executive-level concern, according to the “Cloud Adoption, Practices and Priorities Survey Report,” which was released by the Cloud Security Alliance (CSA) on Friday...

read article

Two unencrypted N.J. health insurance laptops stolen, more than 800k impacted

  • 12-06-2014
  • SC Magazine

Horizon Blue Cross Blue Shield of New Jersey (BCBSNJ) began sending notification letters to more than 800,000 members on Dec. 6, alerting them that their personal information may have been compromised after two unencrypted...

 

read article

Stolen thumb drive contained five years of data on nearly 34K Calif. patients

  • 06-17-2014
  • Store Owner

Nearly 34,000 patients who received X-ray services at California-based Redwood Regional Medical Group are being notified that their personal information was on a thumb drive that was stolen from an employee's locker.

Read Online Article

31-40 of 86