NEWS & BLOG

NEWS & BLOG

Four Basic Requirements for USB Security

written by Simon USB flash drives are still popular portable storage devices because they are small and have relatively large storage capacities. Data on USB flash drives are not only readable but also editable, while data on CDs/DVDs are only readable. Users can edit...

How to Protect a File on a USB Flash Drive from Being Copied

written by Simon We are usually nervous when we hand over sensitive files to an employee who recently started, one who may soon quit the job, or a partner whom we have been working with for only a month. If a sensitive file contains a new product design or a proposal...

Data Breach Risk Caused by Contractors

written by Simon Many companies hire contractors when they consider a job to be of secondary importance to their business and need short-term labor or high-quality professionals for a specific job. A contractor, for the purposes of this blog, can be a freelancer,...

Remotely Manage Your Organization’s USB Flash Drives Using Secudrive

written by Simon If you store your files on a USB flash drive, you can update them and share them with others using any computer, anywhere. This is why many organizations decline to take the USB ports off their employees’ computers, even though USB flash drives are...

Updating Content on USB Flash Drives After Distribution

written by Simon CD/DVD is still one of the most popular mediums for content distribution because it is cheap, convenient to produce and easy to handle and deliver for content producers. In comparison to streaming and download services, a CD/DVD does not require an...

File Activity Monitoring in a File Server

written by Simon In many businesses, a great deal of confidential information is stored in a file server or a Network Attached Storage(NAS) and shared by employees, contractors, consultants, and business associates. Although we easily share files in shared folders to...

Why we need to use USB copy protection

written by Simon There are three ways to distribute content that has copyright or intellectual property: CD/DVD distribution, USB flash drive distribution, and downloading or streaming through the network. CD/DVD has been the most popular content distribution media so...

Security Levels of USB Copy Protection Solutions and Their Use

written by Simon USB copy protection solutions prevent users from unauthorized distribution of content stored on a USB flash drive. However, it is not hard to find unauthorized distributed multimedia files via the internet, despite having been originally made using...

Two Ways of USB Copy Protection for Office Files

written by Simon Traditionally, "copy protection" has been used to describe a technology to keep copyright of an audio/video file or software program from unauthorized copying when distributing it to mass customers. The media for distribution has mostly been a CD/DVD,...

Ways to Prevent HIPAA Data Breach by Insiders

written by Simon The most frequent cause for health data breach accidents is an insider. About half of these accidents are a result of error by insiders while the other half are a result of wrongdoing. Obviously, we should prevent accidents by both causes. (Read:...

Insiders: the Most Frequent Reason for HIPAA Data Breach

written by Simon Ponemon Institute and IBM reported that the average total cost of a data breach is $4M in their study, “2016 Cost of Data Breach Study: Global Analysis,” which researched 383 companies in 12 countries, including the U.S. However, the average total...

[Secure USB Series ④] USB Drive Central Management Solution

written by Simon Central management of USB drives within companies is becoming a big issue of interest. As long as companies use USB drives, they need to be carefully managed in order to prevent information leaks in the enterprise. The USB drives should be managed so...

[Secure USB Series ③] Types of Copy-protected USB Drives

written by Simon Copy-protected USB drives are used to prevent copying of data stored in the USB drive, even if it is accessible. It is divided into two categories depending on the purpose of use: content copy protection and business file copy protection. Content...