Archive for the ‘data security’ Category

Secure usb flash drive – password protected and Encrypted

Encrypted Flash Drives Top Rated Kingston Digital 8GB Data Traveler AES Encrypted

Leave a Comment

Encryption keeps you safe from malware

  The Electronic Frontier Foundation aims to protect Web traffic by encrypting the entire Internet using HTTPS. Chrome now puts a little warning marker in the Address Bar next to any non-secure HTTP address. Encryption is important, and not only for Web surfing. If you encrypt all of the sensitive documents on your desktop or […]

Leave a Comment

The Protection of Personal Information Act (POPI) in South Africa – Benefits and Challenges

by Ilenia Vidili In South Africa the Protection of Personal information Act (POPI) aims to regulate how companies secure the integrity and confidentiality of their data assets by taking technical and organisational measures to prevent the loss of, and damage and unauthorised access to, personal information. POPI was signed into law on 26th November 2013 […]

Leave a Comment

Most common type of data breaches

Cyber attacks have become a regular occurrence in the last few years; in fact, you can’t turn the news on without some mention of a business suffering an attack. Most attacks are fuelled by criminals looking to steal valuable information, but what type of information is being stolen? According to a report by Veracode, the […]

Leave a Comment

Hacking Point of Sale

A hands-on guide to achieve better security at point of sale Hacking Point of Sale – A must-have guide for those responsible for securing payment card transactions. Hacking Point of Sale is a book that tackles the issue of payment card data theft head on. It covers issues from how attacks are structured to the […]

Leave a Comment

Why to use hardware-encrypted USB sticks

Hardware encryption has tangible benefits as file sharing and mobility tools, as backup drives and much more. Also hardware based encryption is more secure because the keys are embedded in the flash drive, require physical access to get, and very specialized knowledge to extract them. Safeguard keys and critical security parameters within crypto-hardware Authentication takes place on the […]

Leave a Comment

Looking for a secure USB stick with hardware encryption

CESG Approved USB Stick CESG is the UK Government’s National Technical Authority for Information Assurance Over 1 million SafeSticks are now in use in the NHS helping to keep patient data and other confidential data secure! Buy your SafeStick today! SafeStick is a secure USB stick with AES 256 bit hardware encryption and is FIPS […]

Comments (5)

Knowledge Management finally gets it’s own book: WKIDM

by Melanie Watson That’s right, Knowledge Management finally has it’s own book:

Leave a Comment

Finding And Securing Sensitive Data In The Enterprise

By Robert Lemos @ DarkReading.com Your organization’s most valuable data may be stored in scattered – and insecure – locations. Here are some tips for identifying that data and making sure it doesn’t leak out When Michael Belloise joined human resources outsourcing firm TriNet four years ago as the IT manager, the amount of sensitive […]

Leave a Comment