GDPR - 25TH MAY 2018

KEEP YOUR DATA SAFE & SECURE

PROTECT DATA ON THE MOVE

Securing data on the move is a prime concern for many businesses.

What if an employee takes customer data home to work on?

Small storage devices like USB drives or HDDs can be easily lost or stolen – globally more than 2 million are lost each year and studies have shown that over half of dropped USB sticks get plugged in.

This leaves your organisation at risk of non-compliance with GDPR.

One easy step to reduce this risk is to use encrypted devices.

Encrypting involved scrambling the data in such a way that only someone with the correct code or key can read it.

GDPR - GENERAL DATA PROTECTION REGULATION

GDPR will make data protection law identical throughout the single European market from 25 May 2018.

It gives businesses a simpler and clearer legal environment in which to operate and people more say in what companies can do with their data.

There are also tougher fines for companies that do not comply. Organizations can be fined up to 4% of annual global turnover or €20 Million.

All of this makes it more important than ever to ensure that your critical and sensitive information is protected properly.

WHAT IS AES 256-BIT ENCRYPTION?

  • AES stands for Advanced Encryption Standard. It is a symmetric block cypher that is adopted throughout the world to encrypt sensitive data.
  • 256-bit refers to the length of the encryption key used to encrypt a data stream or file. A hacker or cracker will require 2256 different combinations to break a 256-bit encrypted message.
  • AES has never been cracked and is safe against any brute force attacks.

'HARWARE' VS 'SOFTWARE' BASED ENCRYPTION

HARDWARE-BASED ENCRYPTION

  • Hardware encryption uses a dedicated processor physically located on the encrypted drive
  • Does not require additional software, so free from malware infection
  • Increased performance by off-loading encryption from the host system
  • Protects against the most common attacks, such as cold boot attacks, malicious code and brute force attacks
  • Requires minimum configuration

SOFTWARE-BASED ENCRYPTION

  • Available for all major operating systems and devices
  • Cost effective
  • Easy to use, upgrade and update
  • Only as safe as your computer – level of protection can be compromised if operating system has low levels of security
  • Complicated to configure for advanced use
  • Susceptible to brute force attacks – hackers can access the computer’s memory and reset the attempt counter

MALWARE EXPLAINED

Viruses: By attaching themselves to files and infecting other files, they can spread uncontrollably, damaging a system’s core functionality and deleting or corrupting files.

Rootkits: These do not contain damaging software – they are a masking technique used to conceal malware, so it goes unnoticed by antivirus detection and removal programs.

Spyware: It hides in the background and spies on users, taking notes on their online activity, including passwords, credit card numbers, surfing habits and more.

Trojans: They disguise themselves as legitimate software. Users download them thinking they are useful pieces of software, instead they end up with an infected computer.

Worms: This is a self-replicating programme intending to spread malicious code. Using network interfaces, they can infect entire networks, either local or across the Internet. They then use infected machines to infect others.

WHAT IS RANSOMWARE?

Ransomware is a type of malware with the ability to silently encrypt your files, before demanding an online ransom payment in exchange for a decrypt key.

It can be installed into systems through a malicious email attachment, an infected software download or by visiting a malicious website or link.

When a system is infected the ransomware works in the background, connecting to a remote server, to encrypt single files, whole directories of files, or complete drives.

It can lock down system files making your web browser, applications, and entire operating system unusable.

SECURE PORTABLE HDD

WITH KEYPAD ACCESS

  • Mandatory 100% 256-bit AES Hardware Encryption
  • 5 to 12-digit passcode
  • NERO backup software
  • Mac and PC compatible
  • Type-C, USB 3.1 Gen 1
  • Hack resistant password entry – erases data after 20 failed attempts

SECURE PORTABLE SSD

WITH KEYPAD ACCESS

  • Mandatory 100% 256-bit AES Hardware Encryption
  • 5 to 12-digit passcode
  • NERO backup software
  • Mac and PC compatible
  • Type-C, USB 3.1 Gen 1
  • Hack resistant password entry – erases after 20 failed attempts

SECURE PORTABLE SSD

WITH KEYPAD ACCESS

  • SSDs use flash memory storage for faster speeds, higher performance and greater reliability
  • Mandatory 100% 256-bit AES Hardware Encryption
  • 5 to 12-digit passcode
  • NERO backup software
  • Mac and PC compatible
  • Type-C, USB 3.1 Gen 1
  • Hack resistant password entry – erases data after 20 failed attempts

ENCRYPTED USB

  • Mandatory 100% drive encryption
  • Up to 12-digit passcode
  • 256-bit AES encryption with security controller based hardware
  • Preloaded with an intuitive autorun security application
  • Password hashing algorithm
  • Hack resistant password entry – erases data after 10 failed attempts
  • No admin rights required in host PC
  • PC & Mac compatible

BACKING-UP AND ARCHIVING

Regular back-ups protect against both accidental or malicious data loss – anything from hardware faults and viruses to human error or theft – as they can be used to restore original data files.

Choosing the right media and back-up procedure depends on many elements:

  • The amount of data being saved
  • The perceived value of the data
  • The levels of accepted risk
  • The length of time you need to keep the data for

BEST PRACTICE - APPLY THE 3-2-1 BACK UP RULE

3

HAVE AT LEAST THREE COPIES OF YOUR DATA

In addition to your primary data, you should also have at least two more backups, which will help significantly reduce the risk of losing data. These could be physical and / or cloud solutions.

2

STORE THE COPIES ON AT LEAST TWO DIFFERENT MEDIA

It is best practice to keep copies of your data on at least two different storage types, such as internal hard disk drives AND removable storage media (tapes, external hard drives, USB drives, SD-cards, CDs, DVDs.)

1

KEEP AT LEAST ONE OFFSITE BACKUP COPY

It’s obvious really, but it’s not a good idea to keep your external storage device in the same room as your production storage. If there is a fire, flood or burglary – you would lose all of your data.

BEST PROTECTIONAGAINST ATTACK

ARCHIVE YOUR DATA

To be completely protected, a user or organisation needs to have data backed up and archived offline.

Any device that is attached to an attacked system or network is vulnerable.

If your back up HDD is plugged into your laptop when a piece of ransomware software is installed it will also be encrypted.

Having most important data archived to optical media can eliminate this risk.

OPTICAL MEDIA & DRIVES

FOR ARCHIVING

  • Blu-ray, DVD, CD media – the best solution for long term storage (25-100 years)
  • Use with Verbatim’s external DVD and Blu-ray Writers
  • Nero Burn&Archive software free with Verbatim DVD and Blu-ray Writers

OPTICAL MEDIA & DRIVES

FOR ARCHIVING

  • Blu-ray, DVD, CD media – the best solution for long term storage (25-100 years)
  • Use with Verbatim’s external DVD and Blu-ray Writers
  • Nero Burn&Archive software free with Verbatim DVD and Blu-ray Writers

SECURE BAGS

WITH RFID SECURE POCKET

  • Range includes rollers, backpacks, camera bags, notebook cases, messenger bags
  • Includes special RFID secure pocket to prevent credit card scanning