NEWS & BLOG

NEWS & BLOG

The GDPR Summary: The 5 Key Points

written by Kevin After four years of discussion and preparation by the European Parliament, the Council of the European Union, and the European Commission, the General Data Protection Regulation (GDPR) is now ready to become effective on May...

Four Basic Requirements for USB Security

written by Simon USB flash drives are still popular portable storage devices because they are small and have relatively large storage capacities. Data on USB flash drives are not only readable but also editable, while data on CDs/DVDs are only readable. Users can edit...

How to Protect a File on a USB Flash Drive from Being Copied

written by Simon We are usually nervous when we hand over sensitive files to an employee who recently started, one who may soon quit the job, or a partner whom we have been working with for only a month. If a sensitive file contains a new product design or a proposal...

Data Breach Risk Caused by Contractors

written by Simon Many companies hire contractors when they consider a job to be of secondary importance to their business and need short-term labor or high-quality professionals for a specific job. A contractor, for the purposes of this blog, can be a freelancer,...

Remotely Manage Your Organization’s USB Flash Drives Using Secudrive

written by Simon If you store your files on a USB flash drive, you can update them and share them with others using any computer, anywhere. This is why many organizations decline to take the USB ports off their employees’ computers, even though USB flash drives are...

Updating Content on USB Flash Drives After Distribution

written by Simon CD/DVD is still one of the most popular mediums for content distribution because it is cheap, convenient to produce and easy to handle and deliver for content producers. In comparison to streaming and download services, a CD/DVD does not require an...

File Activity Monitoring in a File Server

written by Simon In many businesses, a great deal of confidential information is stored in a file server or a Network Attached Storage(NAS) and shared by employees, contractors, consultants, and business associates. Although we easily share files in shared folders to...

Why we need to use USB copy protection

written by Simon There are three ways to distribute content that has copyright or intellectual property: CD/DVD distribution, USB flash drive distribution, and downloading or streaming through the network. CD/DVD has been the most popular content distribution media so...

Security Levels of USB Copy Protection Solutions and Their Use

written by Simon USB copy protection solutions prevent users from unauthorized distribution of content stored on a USB flash drive. However, it is not hard to find unauthorized distributed multimedia files via the internet, despite having been originally made using...

Two Ways of USB Copy Protection for Office Files

written by Simon Traditionally, "copy protection" has been used to describe a technology to keep copyright of an audio/video file or software program from unauthorized copying when distributing it to mass customers. The media for distribution has mostly been a CD/DVD,...

Ways to Prevent HIPAA Data Breach by Insiders

written by Simon The most frequent cause for health data breach accidents is an insider. About half of these accidents are a result of error by insiders while the other half are a result of wrongdoing. Obviously, we should prevent accidents by both causes. (Read:...