Any data stored on businesses' systems is an asset but it's also a liability. Stored on nearly every computer and/or server across a variety of industries, data is not just vulnerable in the event of accidental loss, it's also a high-value target for hackers and data thieves, who want everything from personal identification numbers and customer payment information, to contact lists and intellectual property. While improving data security requires extra precautions, the good news is that it doesn't have to be hard, expensive, or interrupt the user experience.
The best, yet often overlooked, step in protecting data stored on laptops, desktops and/or servers is encryption at the hardware level on the device's storage drive. Why? New systems often come with low-grade pre-installed hard drives which often lack encryption technology. If the hard drive does offer encryption, it's typically software-based, which is one of the weakest forms of encryption. Software-based encryption can also slow down system performance, while still leaving data at risk of being compromised.
The bottom line: If you needed someone to protect you, you'd rather have a strong, muscular person than a skinny bodyguard. When it comes to data security, the choice is similar – hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. In this slideshow, Jonathan Weech, senior worldwide product manager, Crucial, takes a closer look at how self-encrypting SSDs enhance data security strategies.
Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ... More >>
Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ... More >>
Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ... More >>