Welcome to the ClearCrypt Blog!

 RSS Feed

  1. 6S6A0949

     

     

    From students to industry professionals and experts, we all use technological gadgets to help us in our day to day lives – and none other than the humble USB.

    USB stands for “Universal Serial Bus” and is a portable, removable and rewritable data storage device which can serve many purposes in the business world and in our own personal lives. In comparison to previous storage devices including CDs and floppy disks, USBs are much more versatile as they are not prone to magnetic interference, surface scratches and are much faster, durable and reliable. 

    The application is widespread and I’m sure we’ve all used this small reliable device at some point in our professional careers and in our personal lives. However, with the rise in cloud connectivity and more business applications moving toward cloud-based services, the question now becomes;

     “To USB or Not to USB?”

    Internet Connection

    The emergence of cloud services means you can now upload, download, view and edit your data on a multitude of devices whenever you have an Internet connection. This may sound like a huge advantage however, no internet, no access to your data. This is where the humble USB takes the upper hand. Wherever you are, with or without an internet connection all you need is computer and a USB port. Perfect for business travellers or at times of power outages.

     

    Privacy & Security

    Cloud services, at the minimum, require you set up a username and password that is used each time you log in to the service. Depending on your cloud storage provider, it may offer additional security features like two-step verification and data encryption to further protect your sensitive and valuable data.

    A USB generally requires little to no setup before you can start using it but if you don't take additional steps to encrypt or protect the data, anyone who finds the device can access it. However, there are USB products on the market that add an extra layer of security, such as encryption, to further safeguard your data.

     

    Pricing

    After the initial cost of the USB, you own the device outright and there's no need to pay monthly fees to access your data. Cloud services may offer small amounts of storage at no cost, but most have monthly or annual fees that increase with the amount of storage space you require. Google Drive, for example, charges up to $50 a month for 1TB of storage space.

     

    ClearCrypt – Industry Leading Encryption

    In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity, and this is where ClearCrypt come into play.

    ClearCrypt is a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all needs and requirements.  

     

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this cost effective, flexible, easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    You can find out more info about ClearCrypt, our products and how they can serve you and your organisation by clicking here

     

     

     

  2. encryption (1)

     

    So much of our sensitive data is now being stored online, it’s no surprise that cybercrime is on the rise as hackers seek opportunity to make a financial gain through your personal info. Data breaches have long been a problem for businesses and individuals and criminals are ramping up attacks. The numbers are something for concern…

    • Ransomware attacks increased 37% in 2017, with 4,000 attacks occurring daily
    • Average amount demanded after a ransomware attack is $1077
    • 230,000 new malware samples are created daily – and predicted to increase in future
    • 1 in 131 emails contain malware
    • 81% of victims do not have a system in place to self-detect data breaches
    • 43% of cyber-attacks are aimed at SMEs
    • 6.5% of people are victims of identity fraud – resulting in people being defrauded approx. $16billion
    • Android is the 2nd most targeted platform after Windows
    • 90% of hackers use encryption to cover their tracks

     

    The combination of these numbers and facts is a recipe that leaves a bitter taste. It is unsettling to say the least. However, there are ways you can reduce the risk of becoming a victim of a cyber attack. Whether you own a business and are seeking to protect your customer & business data or an individual just wanting to protect your personal credentials online, you can use the very thing hackers use to cover their tracks; ENCRYPTION.

    Encryption technology is one of the key methods for protecting any data that is stored online. What started as simple code used over a telegraph in WW1, is now a sophisticated coded algorithm that allows data to be safely stored and transferred. Encrypted data is known as “cipher text” and can only be decrypted with a key or password. While encryption cannot protect against all cyber-attacks, the technology makes data theft a much more difficult task for hackers, reducing the risk of such an attack against you.

    Still not convinced? Let’s run through the main benefits encryption provides…  

    Maintains Integrity

    Hackers don’t just steal information, they also can benefit from altering data to commit fraud. While it is possible for highly skilled and technical individuals to alter encrypted data, recipients of the data will be able to detect the corruption, allowing for a quick response to the cyber-attack.

    Secure Data At All Times

    Encryption works when data is stored or transferred, making it an ideal solution no matter how data is being used. Usually, data is most vulnerable to attack when being moved from one place to another, therefore encryption ensures protection during this process.

    Protects Privacy

    Encryption is used to protect sensitive data, including personal information for individuals. Encryption therefore ensures anonymity and privacy, reducing opportunities for surveillance by both criminals and government agencies. The technology is so effective Encryption technology is so effective that some governments are attempting to put limits on the effectiveness of encryption.

    Protection Across Multiple Devices

    Mobile devices are a big part of our lives, and we often own several. As technology develops, more and more of these devices are joining the Internet of Things (IoT) phenomenon. Encryption technology can help protect data and sensitive information across all devices, whether being stored or even during transfer.

    Part of Compliance

    Many industries and businesses have strict compliance requirements to help protect the data of their company and their customers or clients. Furthermore. With GDPR fast approaching (May 2018), encryption can be an effective, proactive way to remain complaint with the new legislation.

    At ClearCrypt we use this very technology to offer a product range to suit all needs and requirements. ClearCrypt offer a range of 256-bit Encrypted Storage Devices specifically designed to be robust, secure and cost effective.

    The product range offers encrypted USB 3.0 super speed with a transfer rate up to 5GB per second, which is 10x faster than normal USB 2.0 Drives.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve.

  3. europe-2021308_960_720

     

    I know what you're thinking, "Oh no, not another General Data Protection Regulation (GDPR) blog!" But the countdown is well and truly on.

    we know GDPR will come into full force on 25 May 2018 and organisations of all sizes are wrestling with the impact on their business. As an organisation that specializes in the secure storage of personal and company data, we thought we would share our thoughts and highlight a 5 step guide to GDPR Compliance.

    1. What’s at risk?

    The number one risk is the fine. Failure to comply with GDPR will result is a fine up to 4% of the total annual turnover or €20,000,000, whichever is higher. Therefore, it’s imperative that you look at your business and the impact you have on the data you hold because failure to comply will reduce revenue, profit margins and the valuation of the company. A practical and affordable strategy, policies and actions need to be taken to ensure your business complies with GDPR.

    (Note: This range of fines applies to many of the core provisions of GDPR. Make sure you understand them all)

    2. Base Line

    Don’t panic! Assess where you are now, find your baseline and build from there. There are a number of new rights and obligations but many internal processes and systems can be re-used or just slightly adapted to meet GDPR. Don’t reinvent the wheel.

    Take a step by step approach and if you can get some trusted advice, now is a good time to get it.

    3. Senior Team

    Make sure the senior management team of the organisation knows what it’s all about and what they need to consider

    The GDPR will affect almost every aspect of an organisation, its key stakeholders and a range of business functions including marketing, human resources, information security, legal, product development and website development to name a few.

    4. Understand the data you have and how it should be handled

    The definition of personal data is expanding and specifically covers online identifiers - which is anything that contributes to identifying an individual or that links to identifying information including cookies and IP addresses.

    Consent for example is one of the basis for processing. If your business relies on consent, you will need to review your policies and documentation as GDPR requires clear and concise consent in order for consumer data to be used. (Note: The burden of proof in showing that consent now lies with you)

    5. Review internal procedures for data breaches & prioritize accordingly

    For the first time, GDPR introduces pan-European data breach notification rules.

    Data controllers must compile an internal breach register, regardless of whether a breach triggers a notification or not. The register should include detailed facts about each incident, its effects and remedial action taken or action that will be taken. A notifiable breach must be reported to the relevant supervisory authority within 72 hours of the organisation becoming aware of it. Failure to do so can result in the fines that we previously discussed.

    Consider adopting a cybersecurity framework, carry out regular tests and internal training to ensure efficient processes are in place before 25th May 2018. As the saying goes; “Fail to prepare, prepare to fail” and this is no different with GDPR Compliance.

    ClearCrypt Can Help

    We can help you, even if just a little bit, on your GDPR journey. When it comes to data and bearing in mind Article32 - Security of processing which talks about implementing appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including the encryption of personal data.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve. In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity and the ClearCrypt range;

    • Is flexible
    • Caters for all your data storage requirements
    • Is cost-effective.

    To ensure your data remains safe, secure and compliant to GDPR, see the full range at http://www.clearcrypt.eu/ourshop/

  4. Before we get started, there's a lot going on with ClearCrypt this month! We're having a competition to win a Secure 8GB Encrypted Storage Device. To be in with a chance of winning click here

    Also for a limited time only we're having 10% off our MSATA range of products, to get the discount code click here 

     

    Now, where were we? ah, yes...

    They say the only constant is change… And as we all know, the rate of change in modern times is incredible!

    Sometimes it’s not until we stop and look around do we realise how much our daily lives have changed! I’m sure you have heard these recent quotes…

     

    ·        Facebook, the world’s most popular media owner, creates no content

    ·        Uber, the world’s largest taxi company, owns no vehicles.

    ·        Airbnb, the world’s largest accommodation provider, owns no real estate.

    ·        Alibaba, the most valuable retailer, has no inventory

     

    The internet has revolutionised the way we work, and if you travel for business you will see how technology has developed.

    In the old days, travelling for work used to mean losing touch for long periods of time with your colleagues without receiving updates on information held within with the office. However the internet, and cloud technologies, has enabled us to take the office with us wherever we go in what we now call ‘remote working'.

    Modern business demands we stay in touch, we need to recognise this. We need to stay connected and productive whilst on the move… from emails and cloud business apps such as Google Docs for work, to Skype and Facebook for speaking to family and friends during downtime.

    Smart Phones and Laptops are not the only tech that savvy travellers are bringing with them.

    Have you thought about the following for your next business trip?

     

    Secure Data Storage

    ClearCrypt

    The growing amount of data stored on external drives to cater for the need to store and transfer files and large amounts of data, means that storing this securely is no longer an option but is now mandatory.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve.

    Business travellers need to be able to back-up important data quickly and have safe and secure access to important documents. The need to know it is secure is vital, especially in the event the device containing the data is lost or even stolen. 

     

    Adapt Wherever You Are

    Worldwide USB adaptor

    Business travellers need to adapt to new environments, both culturally and technologically. For the latter, one cheap and simple solution is the Go Travel Worldwide USB Adapter, which sidesteps the need to squeeze extra wires and plugs into overstuffed suitcases. The adaptor’s four sliding pins alternate between American, British, Australian and European plug configurations, and its two USB ports mean you can save time between meetings by charging multiple devices at the same time.

     

    Keep Your Valuables Close

    Nokia Treasure Tag

    Losing your laptop bag, luggage, or other travel accessories could turn into a nightmare… especially if a hacker steals your stuff. This small tag, which lasts up to about six months on one standard watch battery, connects to any smartphone that uses Bluetooth 4.0. If you leave an item behind, the tag itself beeps. You can also search for misplaced items.

     

    Manage Spending

    Prepay Solutions

    When travelling on business you need things to hand. An old-fashioned organiser isn’t the answer!

     

    Think Big!

    FAVI DLP Pico Smart Projector

    While older portable projectors were either bulky or too dim for serious conference room use, this new FAVI Pico Smart Projector shines a bright 100-lumens image and doesn't require a smartphone. Instead, you can run Android apps like Dropbox or Chrome for your slideshow. The image size is up to about 10 feet and it can run on battery power for up to two hours!

     

    Happy travels everyone!

     

  5. CC
     
    Click Here to Enter our competition to be in with the chance to win one of our brand new ClearCrypt Secure 8GB Encrypted Storage Devices. It is a Slim, Secure and Reliable Storage device which is software free, ensuring multi platform support while on the move.

     

    • Real-time AES 256bit encryption
    • Software free
    • Aluminium Casing
    • True Hardware Encryption
    • Super Speed USB 3.0
    • Compact