09.10.2019 Views

Cyber Defense Magazine Global Edition for 2019

Cyber Defense Magazine's Annual Global Edition for 2019: Will Quantum resilient encryption change the future against breaches in our favor? Can deception technology stop the next wave of cybercriminals? This and much more inside this 78 page eMagazine exclusively distributed at www.ipexpoeurope.com each year along with our announcement of the Cyber Defense Global Awards winners for 2019; also found at www.cyberdefenseawards.com.

Cyber Defense Magazine's Annual Global Edition for 2019: Will Quantum resilient encryption change the future against breaches in our favor? Can deception technology stop the next wave of cybercriminals? This and much more inside this 78 page eMagazine exclusively distributed at www.ipexpoeurope.com each year along with our announcement of the Cyber Defense Global Awards winners for 2019; also found at www.cyberdefenseawards.com.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

data security is the best defense against data<br />

loss, as it eliminates the most commonly used<br />

attack routes. This software-free method also<br />

provides comprehensive compatibility with most<br />

OS or embedded equipment possessing a USB<br />

port.<br />

Hardware-based encrypted USB drives are selfcontained,<br />

don’t require a software element on<br />

the host computer, and are the most effective<br />

means in combating ever-evolving cyber threats.<br />

Hardware-encrypted USB drives protect against<br />

the possibility of brute <strong>for</strong>ce, sniffing and memory<br />

hash attacks due to their security being selfcontained<br />

inside the drive.<br />

Software-based encrypted drives are designed<br />

differently. They share a computer’s resources<br />

with other programs. The encryption is not done<br />

on the USB drive at all. Because of this<br />

computer-based encryption process, the USB<br />

drives themselves are vulnerable. In some<br />

cases, there are compatibility issues with older<br />

operating systems that may make the data<br />

unreadable. In addition, re<strong>for</strong>matting a drive<br />

be<strong>for</strong>e storing data can remove all encryption on<br />

the drive, essentially turning a secured drive into<br />

a standard, open drive.<br />

How can I protect my company’s<br />

sensitive data and not hinder<br />

productivity?<br />

Whether you are a local restaurant chain or a<br />

manufacturing company, privacy and security<br />

should always be front and center in how you<br />

manage, transfer or distribute non-Cloud storage<br />

of private / personal data. There should be<br />

standardization <strong>for</strong> best practices <strong>for</strong> what’s<br />

known as data “at-rest” or “in-transit.” While the<br />

most common storage medium is the use of<br />

inexpensive USB drives, the best practice is to<br />

standardize on hardware-based encrypted USB<br />

drives. This practice will provide efficiency and<br />

security to mobile data <strong>for</strong> anyone. Even<br />

accessing Cloud storage can be risky – while<br />

you access the internet at a coffee shop,<br />

someone else may be trying to hack your<br />

system. If you carry your data on a hardwareencrypted<br />

drive, you can work on your data and<br />

keep your internet turned off while in an<br />

untrusted open Wi-Fi area.<br />

So, where to start? As a small or medium<br />

business, you more than likely aren’t going to<br />

need the same level of protection as large<br />

companies and government agencies require.<br />

There is a range of easy-to-use, cost-effective,<br />

encrypted USB flash-drive solutions to choose<br />

from that can go a long way toward mitigating<br />

your privacy and security risks, and, quite<br />

possibly, save you money and stress.<br />

Encrypted USB drive manufacturers provide you<br />

with options, no matter your needs. For example,<br />

Kingston’s IronKey D300S USB Flash drive<br />

features an advanced level of security that builds<br />

upon the features that made IronKey wellrespected,<br />

to safeguard sensitive in<strong>for</strong>mation.<br />

Its FIPS 140-2 Level 3 certified, with 256-bit AES<br />

hardware-based encryption in XTS mode, and<br />

has anti-tampering security built in to protect all<br />

internal components. It is an essential pillar to<br />

setting security standards, corporate policies<br />

and data loss protection (DLP) best practices<br />

and compliance to global regulations such as the<br />

CCPA and GDPR.<br />

16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!