USB Drive

/Tag:USB Drive

How to protect your data from disgruntled employees

family_safeconsole

We hear about cybercriminals and data hackers all the time.  But another threat lies close to home and can be equally if not more devastating.  Sensitive data and corporate intellectual property must be protected at all times, even when it comes to employees.  Disgruntled employees with malicious intent can wreak havoc, as can those who unwittingly violate corporate data use policy.

So what’s an organization to do, especially now that business is more mobile than ever?  How can sensitive data be protected from disgruntled employees?

For starters, having a solid corporate data usage policy and clear standards on the front end is a given.  Privileged passwords that are updated frequently and limited access to data are two things to consider.  In addition, the administrator should ensure that any former employees’ user accounts have been disabled.  IT departments should be vigilant, monitoring for potential insider threats and being aware of activity that looks suspicious or out of the ordinary by anyone that has access to corporate credit cards, proprietary or sensitive business data and other intellectual property.

DataLocker provides many solutions for encrypting data, which greatly reduces the risk of hacking by disgruntled employees or outsiders.  Employers have to be able to manage and track data. This includes knowing who has accessed it and from where, and through which device(s).

When it comes to mobile security, all of DataLocker’s hardware encrypted products, particularly the ones that can be managed with either IronKey EMS or SafeConsole, can give you peace of mind as you protect your data, your mobile workforce and your organization. Unlike most portable storage solutions, DataLocker drives use hardware-based encryption for seamless encryption that does not compromise performance. DataLocker drives also have a self-destruct feature so that if a drive is lost or stolen, potential attackers will not be able to use brute force to break into them. This greatly increases the odds of your organization coming out of the whole experience unscathed. It is imperative that organizations efficiently and cost-effectively protect data by administering usage and encryption policies, password restrictions, and more from a central console. These tasks are made easy with IronKeyEMS.

With SafeConsole central management server software, you can instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives.  Additionally, you will achieve compliance for USB storage usage, while enjoying full control and audit.

SafeCrypt (formerly SkyCrypt) allows users to encrypt data seamlessly at their desktop, and as a result, only encrypted data is synced to the cloud. Even if your cloud service provider is hacked at root level or your personal login is compromised, your files are safe, secure and impenetrable.

DataLocker is committed to helping you protect your most sensitive data, at your desktop, on the go and in the cloud.  If you are interested in receiving an evaluation of your mobile security, or to try one of our products, please click here and an account executive will be in touch.  You may also email us at sales@datalocker.com.

 

How to take control and manage your secure USB drives

The USB drive is everywhere- they can be purchased at every check out counter from office supply stores to convenience stores.  They are portable, small and can hold a relatively large amount of data and make data transport a breeze between office or school and home.  But with portability comes inherent security challenges.

USB device theft, accidental loss and the spread of malicious code can lead to data breaches, compromised customer information, loss of intellectual property and a loss of consumer and even stakeholder confidence. Unsecured and unmanaged USB drives have the potential to becomes digital weapons, as they are the perfect vehicle for delivering malicious programs and viruses. Unsecure USB drives can easily have their firmware rewritten, thus enabling them to inject code into every computer they come into contact with.  Often the owner isn’t even aware that their USB device has been compromised, so they continue to share the infected USB drive.

It may surprise you to know that only 50% of companies have a USB device usage policy, and only about one-half of those companies actually enforce their policies (The State of USB Drive Security, Ponemon Institute, sponsored by Kingston, July 2011).  If you don’t have a data security and management plan in place…you’re not alone.  But- there are things you can and should do to take immediate action! Properly managed, secure USB drives can be a useful tool for companies, and whenever that data becomes portable, a comprehensive plan becomes paramount to the success of data security.  There are several things to consider as part of your planning:

  • How do we get devices connected to a server and under the control of management?
  • Who is ultimately responsible for the devices?
  • Is the end solution compliant with legislation and the organization’s policies?
  • Does the security solution “make sense” for the real world?
  • What does the future hold for this technology?  Is it likely to be supported in years to come?
  • Does our strategy secure ALL of our digital assets, including secure USB drives?

Hardware encrypted USB flash drives are an essential component of a comprehensive data loss prevention (DLP) strategy. DataLocker offers both FIPS 140-2 level 3 devices and standard secure USB flash drives.  All secure USB flash drives from DataLocker can be managed by the SafeConsole central management system which offers enforcement of password policies, remote password resets and audit for compliance and much more.  For additional information or to learn more about our products, please contact us.

Developing a strategy to deploy and secure all digital assets along with implementing the right central management system will create a seamless, secure workflow solution.  It is incumbent upon organizations to mitigate the potential for a USB data breach, which could cost millions in the long run.