09.10.2019 Views

Cyber Defense Magazine Global Edition for 2019

Cyber Defense Magazine's Annual Global Edition for 2019: Will Quantum resilient encryption change the future against breaches in our favor? Can deception technology stop the next wave of cybercriminals? This and much more inside this 78 page eMagazine exclusively distributed at www.ipexpoeurope.com each year along with our announcement of the Cyber Defense Global Awards winners for 2019; also found at www.cyberdefenseawards.com.

Cyber Defense Magazine's Annual Global Edition for 2019: Will Quantum resilient encryption change the future against breaches in our favor? Can deception technology stop the next wave of cybercriminals? This and much more inside this 78 page eMagazine exclusively distributed at www.ipexpoeurope.com each year along with our announcement of the Cyber Defense Global Awards winners for 2019; also found at www.cyberdefenseawards.com.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

What are the penalties under the<br />

new Cali<strong>for</strong>nia Consumer Privacy<br />

Act?<br />

Companies that do not comply with the CCPA<br />

are subject to both civil class action lawsuits in<br />

the state of Cali<strong>for</strong>nia with damages of $100 to<br />

$750 per Cali<strong>for</strong>nia resident and incident, or<br />

actual damages, whichever is greater.<br />

Companies are<br />

Also subject to fines from the state as they can<br />

be prosecuted by the Cali<strong>for</strong>nia Attorney<br />

General.<br />

How does Bring Your Own Device<br />

(BYOD) hinder any cyber security<br />

plan?<br />

The tremendous portability, and exceptional<br />

ease of USB drives have proven to increase<br />

productivity to millions of businesses and<br />

government agencies. However, since most of<br />

these drives are unencrypted, they can pose a<br />

major security risk to the user storing anything<br />

more valuable than public data.<br />

<strong>Cyber</strong> security experts say that the use of an<br />

encrypted USB flash drive is the best solution <strong>for</strong><br />

keeping confidential in<strong>for</strong>mation what it was<br />

intended to be – confidential.<br />

From a cost perspective, hardware-based<br />

encrypted USBs are not much more expensive<br />

than non-encrypted devices – and they are like<br />

insurance against the unthinkable – the loss and<br />

breach of private data that could be exposed<br />

otherwise. When you consider the costs and<br />

consequences of a data breach, losing a drive,<br />

etc., against the low purchase price of a nonencrypted<br />

drive, the cost of an encrypted drive is<br />

the most cost-efficient way to manage threats<br />

and reduce risks.<br />

With various regulations such as HIPPA, CCPA<br />

and GDPR among others, the use of encrypted<br />

USB drives can also provide legal protection to<br />

many industries and professions. The minimal<br />

investment <strong>for</strong> encrypted USB drives will cost<br />

exponentially less than risking a potential data<br />

breach, exposure, damage to your reputation<br />

and enormous possible fines.<br />

Their extreme portability means they are very<br />

susceptible to being lost, accessed, or<br />

misappropriated. When that happens, there is a<br />

fairly good chance that data stored on the device<br />

will end up in the wrong hands, risking the users<br />

or company’s privacy and security.<br />

Having a company policy of standardizing on the<br />

use of hardware-based encrypted USB drives is<br />

a key factor in a USB drive’s ability to provide the<br />

safest, most trustworthy means to store and<br />

transfer personal, classified, sensitive data.<br />

Is hardware and software<br />

encryption preferable?<br />

Not only is encryption vital in USB drives<br />

securing and protecting data, how that<br />

encryption is per<strong>for</strong>med is likewise important.<br />

Users have two choices: hardware and softwarebased<br />

encryption.<br />

USB drive encryption can be done either through<br />

the device’s hardware or software. A hardwarecentric<br />

/ software-free encryption approach to<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!