Welcome to the ClearCrypt Blog!

 RSS Feed

  1. office-1081807_1920 (1)

    Optimism bias is the belief that each of us is more likely to experience good outcomes than to experience bad outcomes. The key to this optimism is that we disregard the reality of an overall situation because we think we are excluded from the potential negative effects.

    Imagine this, out of the blue your computer fails or is lost….what do you do?

    If your only option is to get a new computer or hard drive and start again, would you be able to access all the data that was important to you, would you be sure the data lost is secure in terms of unauthorised access?

    Okay, so you may have passwords set-up, you may have Google drive, Drop Box or other online storage but can you still access all your data, what about your work files, or documents you saved locally?

    Therefore, backing up your data is paramount to business continuity and security. It saves the heartache of starting from scratch, prevents business failure and helps you remain complaint with current legislation. It protects your data, your business and your reputation!

    What are you protecting against?

    Malware Attacks

    Malware is a broad term covering a range of attack categories including viruses, spyware, ransomware and adware, all of which can threaten your computer and the data contained within it. Depending on the severity of your computer s infection, data can be stolen, deleted or rendered inaccessible and your entire computer can become unusable. Backing up your data will allow you access to your valuable data even if you are hit with some form of malware attack.

    Theft

    Whether it’s an insider threat or a criminal off the street, data theft is very real and can potentially end your business. They can steal the hardware equipment or steal all the data on an external drive, delete the original copies and make off with a treasure trove of information. Either way,there’s not much hope that you’ll recover data from a computer that s been stolen. However, by regularly backing up your data on an offsite storage device will allow access to the stolen data if the worst was to happen.

    Human Error  

    Data loss is not always malicious in its intent, it can be accidental and caused by genuine human error. Someone may change or delete a file from the system by mistake and having backups will limit the damage caused. Accidents do happen.

    Physical Damage

    An office disaster, an accident or just simple wear and tear over time can wreak havoc on your computer. If you have a laptop, all you have to do is drop it and it may refuse to start up, requiring expensive repairs and the potential loss of data. However, if your data is backed up, you can easily move it all to a new device.

     

     

    Sudden Failure

    No one sees it coming, and that’s why it’s still a risk to your data. A computer can fail catastrophically, at any time for seemingly no rational reason. Having a backup on external drives will allow you to save and transfer data to new devices easily and efficiently.

    How can ClearCrypt Help?

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this cost effective, flexible, easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    We offer a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all your data backup needs and requirements.

  2. fast facts

     

     

    In a world of increasing complexities and complications, we wanted to keep this blog short, sweet and simple.

    The evolution and advancement in technology over the last decade has been revolutionary and has been the catalyst for more innovation today and into the future. However, the rise of the cybercrime has grown almost simultaneously as more people connect to the internet and an increasing number of hackers seeking opportunities to make a monetary return in the dark, lucrative market they operate in.

    So what does the cyber landscape look like today? Here’s some fast facts;

    • Ransomware attacks increased 36% in 2017
    • 4,000+ ransomware attacks occur every day
    • $1,077 – the average amount demanded after a ransomware attack
    • 230,000 new malware samples are produced every day
    • 1 in 131 emails contains a malware
    • 43% of cyber-attacks are aimed at small businesses.
    • A data breach will cost the average company about $3.8 million
    • By 2019, cybercrime will cost businesses over $2 trillion - a 4-fold increase from 2015

    With these facts in mind, it’s evident that cyber-attacks are growing in prominence on a daily basis – from influencing major elections to crippling businesses overnight, the role cyber warfare plays in our daily lives should not be underestimated. In fact, multi-billionaire investor Warren Buffett claims that cyber threats are the biggest threat to mankind, even more so than nuclear weapons threats.

    How Can ClearCrypt Help?

    A cyber-attack in your organisation isn’t a matter of “IF,” but “WHEN!” At ClearCrypt we can help you protect and backup all your sensitive company and personal data.

    We offer a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all needs and requirements.  

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    For more info about the ClearCrypt range, click here

  3. 6S6A0949

     

     

    From students to industry professionals and experts, we all use technological gadgets to help us in our day to day lives – and none other than the humble USB.

    USB stands for “Universal Serial Bus” and is a portable, removable and rewritable data storage device which can serve many purposes in the business world and in our own personal lives. In comparison to previous storage devices including CDs and floppy disks, USBs are much more versatile as they are not prone to magnetic interference, surface scratches and are much faster, durable and reliable. 

    The application is widespread and I’m sure we’ve all used this small reliable device at some point in our professional careers and in our personal lives. However, with the rise in cloud connectivity and more business applications moving toward cloud-based services, the question now becomes;

     “To USB or Not to USB?”

    Internet Connection

    The emergence of cloud services means you can now upload, download, view and edit your data on a multitude of devices whenever you have an Internet connection. This may sound like a huge advantage however, no internet, no access to your data. This is where the humble USB takes the upper hand. Wherever you are, with or without an internet connection all you need is computer and a USB port. Perfect for business travellers or at times of power outages.

     

    Privacy & Security

    Cloud services, at the minimum, require you set up a username and password that is used each time you log in to the service. Depending on your cloud storage provider, it may offer additional security features like two-step verification and data encryption to further protect your sensitive and valuable data.

    A USB generally requires little to no setup before you can start using it but if you don't take additional steps to encrypt or protect the data, anyone who finds the device can access it. However, there are USB products on the market that add an extra layer of security, such as encryption, to further safeguard your data.

     

    Pricing

    After the initial cost of the USB, you own the device outright and there's no need to pay monthly fees to access your data. Cloud services may offer small amounts of storage at no cost, but most have monthly or annual fees that increase with the amount of storage space you require. Google Drive, for example, charges up to $50 a month for 1TB of storage space.

     

    ClearCrypt – Industry Leading Encryption

    In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity, and this is where ClearCrypt come into play.

    ClearCrypt is a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all needs and requirements.  

     

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this cost effective, flexible, easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    You can find out more info about ClearCrypt, our products and how they can serve you and your organisation by clicking here

     

     

     

  4. encryption (1)

     

    So much of our sensitive data is now being stored online, it’s no surprise that cybercrime is on the rise as hackers seek opportunity to make a financial gain through your personal info. Data breaches have long been a problem for businesses and individuals and criminals are ramping up attacks. The numbers are something for concern…

    • Ransomware attacks increased 37% in 2017, with 4,000 attacks occurring daily
    • Average amount demanded after a ransomware attack is $1077
    • 230,000 new malware samples are created daily – and predicted to increase in future
    • 1 in 131 emails contain malware
    • 81% of victims do not have a system in place to self-detect data breaches
    • 43% of cyber-attacks are aimed at SMEs
    • 6.5% of people are victims of identity fraud – resulting in people being defrauded approx. $16billion
    • Android is the 2nd most targeted platform after Windows
    • 90% of hackers use encryption to cover their tracks

     

    The combination of these numbers and facts is a recipe that leaves a bitter taste. It is unsettling to say the least. However, there are ways you can reduce the risk of becoming a victim of a cyber attack. Whether you own a business and are seeking to protect your customer & business data or an individual just wanting to protect your personal credentials online, you can use the very thing hackers use to cover their tracks; ENCRYPTION.

    Encryption technology is one of the key methods for protecting any data that is stored online. What started as simple code used over a telegraph in WW1, is now a sophisticated coded algorithm that allows data to be safely stored and transferred. Encrypted data is known as “cipher text” and can only be decrypted with a key or password. While encryption cannot protect against all cyber-attacks, the technology makes data theft a much more difficult task for hackers, reducing the risk of such an attack against you.

    Still not convinced? Let’s run through the main benefits encryption provides…  

    Maintains Integrity

    Hackers don’t just steal information, they also can benefit from altering data to commit fraud. While it is possible for highly skilled and technical individuals to alter encrypted data, recipients of the data will be able to detect the corruption, allowing for a quick response to the cyber-attack.

    Secure Data At All Times

    Encryption works when data is stored or transferred, making it an ideal solution no matter how data is being used. Usually, data is most vulnerable to attack when being moved from one place to another, therefore encryption ensures protection during this process.

    Protects Privacy

    Encryption is used to protect sensitive data, including personal information for individuals. Encryption therefore ensures anonymity and privacy, reducing opportunities for surveillance by both criminals and government agencies. The technology is so effective Encryption technology is so effective that some governments are attempting to put limits on the effectiveness of encryption.

    Protection Across Multiple Devices

    Mobile devices are a big part of our lives, and we often own several. As technology develops, more and more of these devices are joining the Internet of Things (IoT) phenomenon. Encryption technology can help protect data and sensitive information across all devices, whether being stored or even during transfer.

    Part of Compliance

    Many industries and businesses have strict compliance requirements to help protect the data of their company and their customers or clients. Furthermore. With GDPR fast approaching (May 2018), encryption can be an effective, proactive way to remain complaint with the new legislation.

    At ClearCrypt we use this very technology to offer a product range to suit all needs and requirements. ClearCrypt offer a range of 256-bit Encrypted Storage Devices specifically designed to be robust, secure and cost effective.

    The product range offers encrypted USB 3.0 super speed with a transfer rate up to 5GB per second, which is 10x faster than normal USB 2.0 Drives.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve.

  5. europe-2021308_960_720

     

    I know what you're thinking, "Oh no, not another General Data Protection Regulation (GDPR) blog!" But the countdown is well and truly on.

    we know GDPR will come into full force on 25 May 2018 and organisations of all sizes are wrestling with the impact on their business. As an organisation that specializes in the secure storage of personal and company data, we thought we would share our thoughts and highlight a 5 step guide to GDPR Compliance.

    1. What’s at risk?

    The number one risk is the fine. Failure to comply with GDPR will result is a fine up to 4% of the total annual turnover or €20,000,000, whichever is higher. Therefore, it’s imperative that you look at your business and the impact you have on the data you hold because failure to comply will reduce revenue, profit margins and the valuation of the company. A practical and affordable strategy, policies and actions need to be taken to ensure your business complies with GDPR.

    (Note: This range of fines applies to many of the core provisions of GDPR. Make sure you understand them all)

    2. Base Line

    Don’t panic! Assess where you are now, find your baseline and build from there. There are a number of new rights and obligations but many internal processes and systems can be re-used or just slightly adapted to meet GDPR. Don’t reinvent the wheel.

    Take a step by step approach and if you can get some trusted advice, now is a good time to get it.

    3. Senior Team

    Make sure the senior management team of the organisation knows what it’s all about and what they need to consider

    The GDPR will affect almost every aspect of an organisation, its key stakeholders and a range of business functions including marketing, human resources, information security, legal, product development and website development to name a few.

    4. Understand the data you have and how it should be handled

    The definition of personal data is expanding and specifically covers online identifiers - which is anything that contributes to identifying an individual or that links to identifying information including cookies and IP addresses.

    Consent for example is one of the basis for processing. If your business relies on consent, you will need to review your policies and documentation as GDPR requires clear and concise consent in order for consumer data to be used. (Note: The burden of proof in showing that consent now lies with you)

    5. Review internal procedures for data breaches & prioritize accordingly

    For the first time, GDPR introduces pan-European data breach notification rules.

    Data controllers must compile an internal breach register, regardless of whether a breach triggers a notification or not. The register should include detailed facts about each incident, its effects and remedial action taken or action that will be taken. A notifiable breach must be reported to the relevant supervisory authority within 72 hours of the organisation becoming aware of it. Failure to do so can result in the fines that we previously discussed.

    Consider adopting a cybersecurity framework, carry out regular tests and internal training to ensure efficient processes are in place before 25th May 2018. As the saying goes; “Fail to prepare, prepare to fail” and this is no different with GDPR Compliance.

    ClearCrypt Can Help

    We can help you, even if just a little bit, on your GDPR journey. When it comes to data and bearing in mind Article32 - Security of processing which talks about implementing appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including the encryption of personal data.

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve. In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity and the ClearCrypt range;

    • Is flexible
    • Caters for all your data storage requirements
    • Is cost-effective.

    To ensure your data remains safe, secure and compliant to GDPR, see the full range at http://www.clearcrypt.eu/ourshop/