Sep 22

Ten tips for USB drive data leak prevention

USB storage devices are popular because of its small size and portability. Even in the enterprises they are often used for data temporary copy and share. However, precisely because it brings convenience, it also brings many risks in the aspect of data security; especially in the field of enterprise- class, as many data and information are highly classified, once they are leaked or breached, the losses caused by them might be incomparable.

So when you are using USB storage devices, how to protect enterprise data? Here, we give you the top ten tips.

1. Manage authorized devices

Software that’s responsible for devices management can help IT staffs to track USB devices connected to the network, so as to understand what data is being transferred, when the data s used. If the IT staffs can’t monitor devices’ dynamic information, sensitive data is likely to be copied or accessed by outside unauthorized staffs.

2. Block unauthorized devices

When not dealing with official business, some staffs still use USB devices to access or copy data. If the data and information is confidential, please disable all ports of unauthorized external devices. Meanwhile, strictly prevent staffs using unauthorized devices to connect to the company computer.

3. Make up USB encryption plans

Make up and implement an encryption scheme. This plan should include how to protect flash memory devices and their data transfer process, specify who can access to the company data and make up a response plan when the device get lost.

4. Provide company-approved devices

It’s necessary to not only tell staffs that they need to use encrypted drives and set password, but also provide company-approved devices. If enterprise can’t provide secure USB device and its execution policy, staffs will often adopt unsecure practices.

5. Adopt appropriate secure level

Enterprises often need to seek balance among cost control, security and productivity. Find the right secure level according to company’s budget. If you do not need military secure level, you do not need to spend too much money.

6. User training and education

Make employees understand how to safely use a variety of devices. Companies often require using secure devices, while there are still data leak incidents, which is mainly because staffs don’t use these devices, for they feel difficult to use. It’s a must to let employees fully be aware of the consequences of not using secure devices.

7. Clarify secure policy

Making up policies is only the first step, but it’s very important. Define individuals who can download data into secure drives, and create a limitation that only allows these users to access. To clarify who to obtain these devices, and how to place these devices and which type of password should be used to protect them.

8. Encrypt data

The confidential data is sent via emails or removable storage media transmission, they should be password protected before users to use them. If data is not encrypted in advance, attackers can bypass secure control and directly access these data.

9. Protect endpoints

Even the most careful users will connect infected USB to the company computer. The latest anti-virus software is critical because it ensures access networks are secure. When the USB is connected to network, it requires scanning them as soon as possible. For older Windows computers, they need to install patches to disable autorun.

10. Disable unsecure devices

A report of Ponemon institute found that even if the company will provide approved secure devices, 72% of employees still used meeting and trade exhibition drive devices, while these drives tend to spread malicious software.

Oct 09

The Ban on Samsung Smartphone Import Is in Effect

According to the news, the U.S. Trade Representative’s office (USTR) said on Thursday that the ban on importing Samsung smartphones proposed by U.S. International Trade Commission (hereinafter referred to as “ITC”) will come into effect.

The earlier report said that owing to the absence of a veto by the United States President Barack Obama, the ban on imports of Samsung smartphones ruled by ITC is already in force.

However, the ITC’s ruling has to be handed over to U.S. President Barack Obama for considering, Obama has 60 days to give the final result of this ruling. If Obama does not veto the ITC ruling, the ruling will come into effect. Several media reports said, now 60 days time has passed, and Obama did not veto the decision.

ITC’s decision does not clearly indicate which devices of Samsung infringe, but has been determined that, Galaxy S 4G, Fascinate and Galaxy Tab these old models are infringing.

In sharp contrast, Apple has had a similar experience, but the result was the opposite. In June this year, ITC has ruled that some old products of Apple has infringed the patent of data transferring of Samsung’s products and ban the import or sale of AT & T version of the iPhone 4, iPhone 3GS, iPad (3G version) and iPad2 (3G version). But in August this year, the Obama government has rejected ITC’s ruling.

Nowadays, innovations in the field of IT usually rely on many small improvements involving numerous technologies, which means the patent is not always clear precisely. The open secret is that everyone infringes others’ patents in some way.

The battles of patent between companies are continuing, the fights of copyright are also continuous. If you operate a business and your company specializes in selling created videos or documents to customers, most companies tend to store the videos or documents into a USB and sell this USB to customers, but what can you do to protect your copyright from being breached by others? Here, I recommend you to use USB encryption solution to ensure the contents in your USBs will not be copied or transmitted by unauthorized users. You can use USB copy protection program to password protect the USB and configure access permissions to specific groups or individuals to allow them to access the contents in it and prevent other unauthorized access at the same time. Complete protection is the indispensable measure to ensure the security of companies’ wealth and inventions.

Jan 11

Watch out for Rental PCs and Protect Your Privacy

Computers are now useful tools for people to handle their files and documents and offer them the chance to fulfill other requirement in both office use and family entertainment. For many people buying a computer directly is not economical so they rent-to-pay them for a period of time untilled they get the computer. While it has been proved that this method was insecure to some extent , according to some reports about rental agent using spyware to monitor the private life of the renter.

Nowadays, people value their data protection on PC and other digital devices, especially for folders contain personal information, therefore they adopt USB protection software or folder encryption application to guard their data security. How about stop spying from a computer that they have to use every day?

It is reported that a renter was monitored when he was using the rental computer, and at that time he was playing an online game then the other day he was shown a screenshot of his PC at that moment and some details about entering a password while he was visiting a website. Then he was required to pay for the PC at once by an employee of the rental agency. This is not reasonable of course and the renter was startled. Finally, after investigation, the employee revealed that the computer was installed with spy administrator streamline to enable the employees of the rental agency to track physical location of the PC and remotely activate its webcam and capture screenshots and keystrokes.

Remote controlling of the PC can help the rent agency to get customer information and secrets easily, a screen shot from a online game is not a big deal, while how about the camera your private life and hijack you and then ruin your reputation? The consequence is awful and terrible for any computer user. Fortunately, this crime activity is revealed and the rental agency was sued in the court. But no one knows the number about computers that are monitored by the rental agency and how many private data they’ve got, and will they cause further damage for PC users?

It aroused heated discussion about whether users’ computer privacy should be protected. The answer is obvious a yes. As PC and other digital electronics are parts of people’s life, people are trying their best to safeguard data and files in computer and prevent attacked from the Internet as well. As individuals value folder encryption and file protection more often, there are various of ways at their choices to ensure data security of personal information and business data.

From USB copy protection to malware and virus irritation prevention on the Internet, people have their own consideration about data security from all aspects. However, they share the same concern about protection of the most confidential and private information, so that as ordinary PC user, you need to pay attention on your computer and if you have to tent PC, you can go for a certificated agency. It is a fact that real protection comes from your carefulness and close attention.      

Jan 09

USB Flash Disk in 1TB Supports USB 3.0

USB flash disk is a widely used tool for people live in the Information Age, it has small size and large storage volume, while how large the storage volume is, the answer is keep increasing these years rapidly, from Ms to Gs, and now maybe Ts. In the 2013 CES (International Consumer Electronics Show) Kingston released a new USB flash drive disk in 1T storage and it support USB 3.0.

USB flash drive disk in 8GB, 16GB, 32GB is a usual product we can see in the market, in the mean time, HDD hard disks in 1TB, 2TB, 3TB had won their popularity for a long time for people with requirement to store very large files. While this DataTraveler HyperX Predator USB 3.0 may startle people all over the world, this makes chain the USB flash disk as an accessory to key ring possible this year. And people can store more files in the USB drive disk and then carry them around freely. Tremendous storage may bring convenience to people who use it and when it allows people to store more and more files in the USB flash drive, it may pose risk to USB protection when placing sensitive files in the disk.     

It is reported that, this Kingston not only supports USB 3.0, but also support the newly released SuperSpeed USB 3.0, which has the maximum transmission rate up to 10Gbps. Therefore, you never need to worry about speed of data writing and reading in this USB disk. With the use of neat-looking zinc alloy material, DataTraveler HyperX Predator USB 3.0 offers two models: DTHX30/512GB and DTHX30/1T, they are with storage capacity of 512GB and 1TB. About the price, the former 512GB USB flash drive disk is 1750 US dollar, which is very expensive for ordinary user, and the later have not give a price yet, and it plan to be put into the market in the end of the 1st quarter of this year, the price is not so favorable for most people, too.

With the exhibition of the DataTraveler HyperX Predator USB 3, people may predict the day they abandon HDD hard drive some day and enjoy using tiny and portable USB flash drive. While one thing for sure is that the small size and large storage will sure result in more and more data breach and data losing incidence. Therefore, issues concern with USB security and USB copy protection will increase.

The emerging of a new technology or a new product surely requires the verification of users and effect of time, it is hard to say it is a good one or suck one, so that let’s hope together for its popularity someday and test it by ourselves.