Welcome to the ClearCrypt Blog!

 RSS Feed

  1. encryption (1)

     

    So much of our sensitive data is now being stored online, it’s no surprise that cybercrime is on the rise as hackers seek opportunity to make a financial gain through your personal info. Data breaches have long been a problem for businesses and individuals and criminals are ramping up attacks. The numbers are something for concern…

    • Ransomware attacks increased 37% in 2017, with 4,000 attacks occurring daily
    • Average amount demanded after a ransomware attack is $1077
    • 230,000 new malware samples are created daily – and predicted to increase in future
    • 1 in 131 emails contain malware
    • 81% of victims do not have a system in place to self-detect data breaches
    • 43% of cyber-attacks are aimed at SMEs
    • 6.5% of people are victims of identity fraud – resulting in people being defrauded approx. $16billion
    • Android is the 2nd most targeted platform after Windows
    • 90% of hackers use encryption to cover their tracks

     

    The combination of these numbers and facts is a recipe that leaves a bitter taste. It is unsettling to say the least. However, there are ways you can reduce the risk of becoming a victim of a cyber attack. Whether you own a business and are seeking to protect your customer & business data or an individual just wanting to protect your personal credentials online, you can use the very thing hackers use to cover their tracks; ENCRYPTION.

    Encryption technology is one of the key methods for protecting any data that is stored online. What started as simple code used over a telegraph in WW1, is now a sophisticated coded algorithm that allows data to be safely stored and transferred. Encrypted data is known as “cipher text” and can only be decrypted with a key or password. While encryption cannot protect against all cyber-attacks, the technology makes data theft a much more difficult task for hackers, reducing the risk of such an attack against you.

    Still not convinced? Let’s run through the main benefits encryption provides…  

    Maintains Integrity

    Hackers don’t just steal information, they also can benefit from altering data to commit fraud. While it is possible for highly skilled and technical individuals to alter encrypted data, recipients of the data will be able to detect the corruption, allowing for a quick response to the cyber-attack.

    Secure Data At All Times

    Encryption works when data is stored or transferred, making it an ideal solution no matter how data is being used. Usually, data is most vulnerable to attack when being moved from one place to another, therefore encryption ensures protection during this process.

    Protects Privacy

    Encryption is used to protect sensitive data, including personal information for individuals. Encryption therefore ensures anonymity and privacy, reducing opportunities for surveillance by both criminals and government agencies. The technology is so effective Encryption technology is so effective that some governments are attempting to put limits on the effectiveness of encryption.

    Protection Across Multiple Devices

    Mobile devices are a big part of our lives, and we often own several. As technology develops, more and more of these devices are joining the Internet of Things (IoT) phenomenon. Encryption technology can help protect data and sensitive information across all devices, whether being stored or even during transfer.

    Part of Compliance

    Many industries and businesses have strict compliance requirements to help protect the data of their company and their customers or clients. Furthermore. With GDPR fast approaching (May 2018), encryption can be an effective, proactive way to remain complaint with the new legislation.

    At ClearCrypt we use this very technology to offer a product range to suit all needs and requirements. ClearCrypt offer a range of 256-bit Encrypted Storage Devices specifically designed to be robust, secure and cost effective.

    The product range offers encrypted USB 3.0 super speed with a transfer rate up to 5GB per second, which is 10x faster than normal USB 2.0 Drives.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve.

  2. europe-2021308_960_720

     

    I know what you're thinking, "Oh no, not another General Data Protection Regulation (GDPR) blog!" But the countdown is well and truly on.

    we know GDPR will come into full force on 25 May 2018 and organisations of all sizes are wrestling with the impact on their business. As an organisation that specializes in the secure storage of personal and company data, we thought we would share our thoughts and highlight a 5 step guide to GDPR Compliance.

    1. What’s at risk?

    The number one risk is the fine. Failure to comply with GDPR will result is a fine up to 4% of the total annual turnover or €20,000,000, whichever is higher. Therefore, it’s imperative that you look at your business and the impact you have on the data you hold because failure to comply will reduce revenue, profit margins and the valuation of the company. A practical and affordable strategy, policies and actions need to be taken to ensure your business complies with GDPR.

    (Note: This range of fines applies to many of the core provisions of GDPR. Make sure you understand them all)

    2. Base Line

    Don’t panic! Assess where you are now, find your baseline and build from there. There are a number of new rights and obligations but many internal processes and systems can be re-used or just slightly adapted to meet GDPR. Don’t reinvent the wheel.

    Take a step by step approach and if you can get some trusted advice, now is a good time to get it.

    3. Senior Team

    Make sure the senior management team of the organisation knows what it’s all about and what they need to consider

    The GDPR will affect almost every aspect of an organisation, its key stakeholders and a range of business functions including marketing, human resources, information security, legal, product development and website development to name a few.

    4. Understand the data you have and how it should be handled

    The definition of personal data is expanding and specifically covers online identifiers - which is anything that contributes to identifying an individual or that links to identifying information including cookies and IP addresses.

    Consent for example is one of the basis for processing. If your business relies on consent, you will need to review your policies and documentation as GDPR requires clear and concise consent in order for consumer data to be used. (Note: The burden of proof in showing that consent now lies with you)

    5. Review internal procedures for data breaches & prioritize accordingly

    For the first time, GDPR introduces pan-European data breach notification rules.

    Data controllers must compile an internal breach register, regardless of whether a breach triggers a notification or not. The register should include detailed facts about each incident, its effects and remedial action taken or action that will be taken. A notifiable breach must be reported to the relevant supervisory authority within 72 hours of the organisation becoming aware of it. Failure to do so can result in the fines that we previously discussed.

    Consider adopting a cybersecurity framework, carry out regular tests and internal training to ensure efficient processes are in place before 25th May 2018. As the saying goes; “Fail to prepare, prepare to fail” and this is no different with GDPR Compliance.

    ClearCrypt Can Help

    We can help you, even if just a little bit, on your GDPR journey. When it comes to data and bearing in mind Article32 - Security of processing which talks about implementing appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including the encryption of personal data.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve. In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity and the ClearCrypt range;

    • Is flexible
    • Caters for all your data storage requirements
    • Is cost-effective.

    To ensure your data remains safe, secure and compliant to GDPR, see the full range at http://www.clearcrypt.eu/ourshop/

  3. Before we get started, there's a lot going on with ClearCrypt this month! We're having a competition to win a Secure 8GB Encrypted Storage Device. To be in with a chance of winning click here

    Also for a limited time only we're having 10% off our MSATA range of products, to get the discount code click here 

     

    Now, where were we? ah, yes...

    They say the only constant is change… And as we all know, the rate of change in modern times is incredible!

    Sometimes it’s not until we stop and look around do we realise how much our daily lives have changed! I’m sure you have heard these recent quotes…

     

    ·        Facebook, the world’s most popular media owner, creates no content

    ·        Uber, the world’s largest taxi company, owns no vehicles.

    ·        Airbnb, the world’s largest accommodation provider, owns no real estate.

    ·        Alibaba, the most valuable retailer, has no inventory

     

    The internet has revolutionised the way we work, and if you travel for business you will see how technology has developed.

    In the old days, travelling for work used to mean losing touch for long periods of time with your colleagues without receiving updates on information held within with the office. However the internet, and cloud technologies, has enabled us to take the office with us wherever we go in what we now call ‘remote working'.

    Modern business demands we stay in touch, we need to recognise this. We need to stay connected and productive whilst on the move… from emails and cloud business apps such as Google Docs for work, to Skype and Facebook for speaking to family and friends during downtime.

    Smart Phones and Laptops are not the only tech that savvy travellers are bringing with them.

    Have you thought about the following for your next business trip?

     

    Secure Data Storage

    ClearCrypt

    The growing amount of data stored on external drives to cater for the need to store and transfer files and large amounts of data, means that storing this securely is no longer an option but is now mandatory.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve.

    Business travellers need to be able to back-up important data quickly and have safe and secure access to important documents. The need to know it is secure is vital, especially in the event the device containing the data is lost or even stolen. 

     

    Adapt Wherever You Are

    Worldwide USB adaptor

    Business travellers need to adapt to new environments, both culturally and technologically. For the latter, one cheap and simple solution is the Go Travel Worldwide USB Adapter, which sidesteps the need to squeeze extra wires and plugs into overstuffed suitcases. The adaptor’s four sliding pins alternate between American, British, Australian and European plug configurations, and its two USB ports mean you can save time between meetings by charging multiple devices at the same time.

     

    Keep Your Valuables Close

    Nokia Treasure Tag

    Losing your laptop bag, luggage, or other travel accessories could turn into a nightmare… especially if a hacker steals your stuff. This small tag, which lasts up to about six months on one standard watch battery, connects to any smartphone that uses Bluetooth 4.0. If you leave an item behind, the tag itself beeps. You can also search for misplaced items.

     

    Manage Spending

    Prepay Solutions

    When travelling on business you need things to hand. An old-fashioned organiser isn’t the answer!

     

    Think Big!

    FAVI DLP Pico Smart Projector

    While older portable projectors were either bulky or too dim for serious conference room use, this new FAVI Pico Smart Projector shines a bright 100-lumens image and doesn't require a smartphone. Instead, you can run Android apps like Dropbox or Chrome for your slideshow. The image size is up to about 10 feet and it can run on battery power for up to two hours!

     

    Happy travels everyone!

     

  4. CC
     
    Click Here to Enter our competition to be in with the chance to win one of our brand new ClearCrypt Secure 8GB Encrypted Storage Devices. It is a Slim, Secure and Reliable Storage device which is software free, ensuring multi platform support while on the move.

     

    • Real-time AES 256bit encryption
    • Software free
    • Aluminium Casing
    • True Hardware Encryption
    • Super Speed USB 3.0
    • Compact

     

  5. pexels-photo

     

    I’m not going to get all political, Or am I!?

    BUT...

    ...With the latest ban regarding electronic devices on airlines I thought I would share some insight:

    First of all, let’s look at which devices are banned.

    1.      Medical devices (and cameras on U.K.bound flights) will still be allowed in the cabin after security screening.

    2.      Smartphones will still be allowed in the cabin. However, any electronic devices bigger than a smartphone must be checked in, either with your luggage or at the gate. That includes cameras, laptops, gaming devices and tablets such as iPads. 

    I think we all kind of get this,  due to the very real threats that exist, but just look at the impact… additional  hassle, costs and overall disruption. The government is highly motivated and with all the resources at hand they can certainly enforce such a ban.

    Although we only need to look at other examples such as “Alcohol” and prohibition in the early 20th Century America, a success? or a failure that only drove it underground? It’s hard to resist people power, pretty much every time something is banned, people will use their ingenuity to find a way around it!

    Working in the IT Security space I see examples of “work arounds” all the time, whether that’s shared passwords, VPN’s to get around web restrictions and so on.

    The perennial problem for IT teams and gatekeepers is keeping one step ahead, and one of those areas is USB drives/memory devices and the risk they bring to business in terms of potential data breaches. So why don’t we just ban them?

    Well we could, BUT maybe there’s a better way, as the adage goes, if you can’t beat them, join them… with the continuing development of secure portable storage options such as CLEARCRYPT which offers an affordable, flexible, but most of all SECURE, solutions for users wishing to keep their data portable and their IT teams happy.

    Check out the CLEARCRYPT range to see which option would suit your or your business - http://www.clearcrypt.eu/