Any data stored on businesses' systems is an asset but it's also a liability. Stored on nearly every computer and/or server across a variety of industries, data is not just vulnerable in the event of accidental loss, it's also a high-value target for hackers and data thieves, who want everything from personal identification numbers and customer payment information, to contact lists and intellectual property. While improving data security requires extra precautions, the good news is that it doesn't have to be hard, expensive, or interrupt the user experience.
The best, yet often overlooked, step in protecting data stored on laptops, desktops and/or servers is encryption at the hardware level on the device's storage drive. Why? New systems often come with low-grade pre-installed hard drives which often lack encryption technology. If the hard drive does offer encryption, it's typically software-based, which is one of the weakest forms of encryption. Software-based encryption can also slow down system performance, while still leaving data at risk of being compromised.
The bottom line: If you needed someone to protect you, you'd rather have a strong, muscular person than a skinny bodyguard. When it comes to data security, the choice is similar – hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. In this slideshow, Jonathan Weech, senior worldwide product manager, Crucial, takes a closer look at how self-encrypting SSDs enhance data security strategies.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>