Data Protection by Design and by Default: Technological Measures

Data Protection by Design and by Default: Technological Measures

written by Kevin Just over five months from now, the GDPR will be enforced for a stricter, thorough, and fair protection of personal data of all EU citizens, and the organizations with the presence in the EU have a tough task of GDPR compliance in their hands. To...
Checklist for the Organizations to Comply with the GDPR

Checklist for the Organizations to Comply with the GDPR

written by Kevin May 25, 2018, the deadline for GDPR compliance is approaching, and organizations around the world are gearing up to identify what to do and where to begin. More comprehensive and ambiguous than its predecessor, European Data Protection Directive, the...
The GDPR Summary: The 5 Key Points

The GDPR Summary: The 5 Key Points

written by Kevin After four years of discussion and preparation by the European Parliament, the Council of the European Union, and the European Commission, the General Data Protection Regulation (GDPR) is now ready to become effective on May 25, 2018 to achieve more...
If You Have To Store Top Secret Information on USB Flash Drives…

If You Have To Store Top Secret Information on USB Flash Drives…

written by Simon On October 28, Daily Mirror reported a severe data breach through an unencrypted USB flash drive that was discovered by a pedestrian in the street of west London. The USB flash drive contained 2.5 GB of classified data, in the form of at least 174...
Four Basic Requirements for USB Security

Four Basic Requirements for USB Security

written by Simon USB flash drives are still popular portable storage devices because they are small and have relatively large storage capacities. Data on USB flash drives are not only readable but also editable, while data on CDs/DVDs are only readable. Users can edit...
How to Protect a File on a USB Flash Drive from Being Copied

How to Protect a File on a USB Flash Drive from Being Copied

written by Simon We are usually nervous when we hand over sensitive files to an employee who recently started, one who may soon quit the job, or a partner whom we have been working with for only a month. If a sensitive file contains a new product design or a proposal...