Welcome to the ClearCrypt Blog!

 RSS Feed

  1. cc

    From students to industry professionals, we all use technological devices to help us in our day to day lives – in the era of smartphones one device is standing the test of time more than others, none other than the humble USB drive!

    It serves many purposes in the business world and in our personal lives, in comparison to previous storage devices (CDs and floppy disks), USB devices have stood the test of time, why? It all comes down to versatility and practicality, the USB backup device has a huge advantage over its old rivals, not being prone to magnetic interference, surface scratches, its small, fast, durable and reliable.   

    The proliferation is widespread, I’m sure we’ve all used one at some point. However, with the rise in cloud connectivity and more business applications moving toward cloud-based services, the contest between USB Storage and The Cloud has become more closely matched.

    Let’s look at how they line up…

    Pricing

    After the initial cost of the USB, you own the device outright and there's no need to pay monthly fees to access your data. Cloud services may offer small amounts of storage at no cost, but most have monthly or annual fees that increase with the amount of storage space you require. Google Drive, for example, charges up to $50 a month for 1TB of storage space.

     

    Connectivity

    Cloud services such as Drop Box and Google Drive means you can now upload, download, view and edit your data on a multitude of devices, however you do need to be online! There is no doubting the benefits of Cloud storage, but when it comes to sharing or moving data (especially if its sensitive information) there is a tendency to trust the cloud less.  This is where the humble USB Device takes the upper hand, wherever you are, with or without an internet connection all you need is your computer and a USB port. Perfect for business travellers or at times of power outages.

     

    Privacy & Security

    Cloud services, at a minimum, require you set up a username and password that is used each time you log in to the service. Depending on your cloud storage provider, it may offer additional security features like two-step verification and data encryption to further protect your sensitive and valuable data.

     

    A USB Device generally requires little to no setup before you can start using it BUT if you don't take additional steps to encrypt or protect the data, anyone who finds the device can access it.

     

    The trend within business organisations is to invest in encrypted USB products for their staff, IT departments have tried “locking down” systems to stop information being copied but realised that it can be a losing battle, better to have data which is being copied protected rather than face the risk of data leaks through lost or stolen, unprotected, USB devices.  This add the extra layer of security, encryption, to further safeguard your data.

     

    ClearCrypt – Industry Leading Encryption

    In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity, and this is where ClearCrypt come into play.

    ClearCrypt is a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offeringindustry leading encryption and a product range to suit all needs and requirements.

    Privileged, confidential or sensitive data must always be protected  from intentional or accidental loss. The ClearCrypt range of devices are designed to make this cost effective, flexible, easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    You can find out more info about ClearCrypt, our products and how they can serve you and your organisation by clicking here or give me a call on +353 1 2809410 to discuss how ClearCrypt can best fit into your business.

  2. CCC

    The cyber space is huge and hiving with activity on a daily basis. Here’s an insight into some of those dynamics;

    • The 2 most expensive viruses in history both cost nearly $40 billion
    • Over 7 billion data records have been stolen since 2013 and counting
    • Over 7% of data breaches seen the attacker compromise the system in under ONE minute

    It almost seems that data breaches and compromised records are becoming a regular occurrence in today’s society.  Data breaches appear to follow the psychology of the Optimism bias, i.e. the belief that each of us is more likely to experience good outcomes than bad outcomes – we do this disregarding the reality of an overall situation because we think we are excluded from the potential negative effects. 

    If you ask a friend, colleague, customer if they think data breaches are on the increase I am pretty sure they will say yes, yet I don’t see a collective responsibility to solving the problem!

    Enter the Cyber professionals who are fighting the battle behind the scenes, there is an answer and its ENCRYPTION.

    Encryption technology is one of the key methods for protecting any data that is stored whether off or online. What started as simple code used over a telegraph in WW1, is now a sophisticated coded algorithm that allows data to be safely stored and transferred. Encrypted data, also known as “cipher text” can only be decrypted with a key or password and while encryption cannot protect against all cyber-attacks, the technology makes data theft a much more difficult task for hackers.

    When Can You Use It?

    Generally speaking, there are two contexts when you can use encryption; in transit and at rest. In transit refers to data that is being transferred from one place to another, for example, when you send it via the web or in an email. On the other hand, data at rest is when it is in storage. Whether it is stored on a hard drive, USBs or servers, the data that is stored on them is considered at rest.

    When you encrypt data in transit, you are essentially using encryption to try to dissuade people from eavesdropping on your conversation or seeing your personal data. One of the most common forms of this is encrypted web traffic which most of us experience every day and don’t even realise. A lot of websites, particularly financial sites, social media sites and email sites, now use this by default and you do not need to do anything special to make this happen. Whenever you see that little padlock icon to the left of the website’s URL, and if it uses a web address that starts with “HTTPS”, that means your data is being encrypted. This increases the security of the transmission of data both to and from your computer and the website you are using.

    Encrypting data while in storage is equally important. Leaving data on a server, on a PC or portable devices with no encryption is like leaving your house unlocked while you go about your daily business. The only thing you have is hope, the hope that no one burgles your home and its exactly the same in the context of data at rest. Cyber criminals are ruthless and WILL steal your data if left unprotected, however, deploying encryption to your data at rest will increase your security and decrease the risk of any data theft.

    GDPR - Keeping Yourself Compliant

    Compliance and in the case of GDPR has been a positive force in the war against cyber attaches, by utilising encryption, not only will you protect your data in transit and at rest, you will also protect your company from the large fines now implemented under GDPR. If you fail to comply with the new legislation, the fines are between 2-4% of annual turnover, or 20 million Euros, whichever is higher. Additionally, frequent breaches of the regulations and failure to address the issue can result in higher fines of up to €40 million resulting in dents to profit margins and can even doom some business to bankruptcy and failure. Encryption can give you a peace of mind that your data is secure and is a vital component of being and remaining GDPR compliant.

    Can ClearCrypt Help?

    Yes!

    In our ever-connected world, an encryption not just an accessory but rather a necessity, and this is where ClearCrypt come into play.

    ClearCrypt offer a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offeringindustry leading encryption and a product range to suit all needs and requirements.  

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range are designed to make this cost effective, flexible and easy to achieve. We have also realised there is no speed limits on data transfers, so our devices have speeds up to 5GB per second, 10x faster than the normal USB 2.0 drives.

    You can find out more info about ClearCrypt, our products and how they can serve you and your organisation by clicking here

     

  3. office-1081807_1920 (1)

    Optimism bias is the belief that each of us is more likely to experience good outcomes than to experience bad outcomes. The key to this optimism is that we disregard the reality of an overall situation because we think we are excluded from the potential negative effects.

    Imagine this, out of the blue your computer fails or is lost….what do you do?

    If your only option is to get a new computer or hard drive and start again, would you be able to access all the data that was important to you, would you be sure the data lost is secure in terms of unauthorised access?

    Okay, so you may have passwords set-up, you may have Google drive, Drop Box or other online storage but can you still access all your data, what about your work files, or documents you saved locally?

    Therefore, backing up your data is paramount to business continuity and security. It saves the heartache of starting from scratch, prevents business failure and helps you remain complaint with current legislation. It protects your data, your business and your reputation!

    What are you protecting against?

    Malware Attacks

    Malware is a broad term covering a range of attack categories including viruses, spyware, ransomware and adware, all of which can threaten your computer and the data contained within it. Depending on the severity of your computer s infection, data can be stolen, deleted or rendered inaccessible and your entire computer can become unusable. Backing up your data will allow you access to your valuable data even if you are hit with some form of malware attack.

    Theft

    Whether it’s an insider threat or a criminal off the street, data theft is very real and can potentially end your business. They can steal the hardware equipment or steal all the data on an external drive, delete the original copies and make off with a treasure trove of information. Either way,there’s not much hope that you’ll recover data from a computer that s been stolen. However, by regularly backing up your data on an offsite storage device will allow access to the stolen data if the worst was to happen.

    Human Error  

    Data loss is not always malicious in its intent, it can be accidental and caused by genuine human error. Someone may change or delete a file from the system by mistake and having backups will limit the damage caused. Accidents do happen.

    Physical Damage

    An office disaster, an accident or just simple wear and tear over time can wreak havoc on your computer. If you have a laptop, all you have to do is drop it and it may refuse to start up, requiring expensive repairs and the potential loss of data. However, if your data is backed up, you can easily move it all to a new device.

     

     

    Sudden Failure

    No one sees it coming, and that’s why it’s still a risk to your data. A computer can fail catastrophically, at any time for seemingly no rational reason. Having a backup on external drives will allow you to save and transfer data to new devices easily and efficiently.

    How can ClearCrypt Help?

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this cost effective, flexible, easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    We offer a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all your data backup needs and requirements.

  4. fast facts

     

     

    In a world of increasing complexities and complications, we wanted to keep this blog short, sweet and simple.

    The evolution and advancement in technology over the last decade has been revolutionary and has been the catalyst for more innovation today and into the future. However, the rise of the cybercrime has grown almost simultaneously as more people connect to the internet and an increasing number of hackers seeking opportunities to make a monetary return in the dark, lucrative market they operate in.

    So what does the cyber landscape look like today? Here’s some fast facts;

    • Ransomware attacks increased 36% in 2017
    • 4,000+ ransomware attacks occur every day
    • $1,077 – the average amount demanded after a ransomware attack
    • 230,000 new malware samples are produced every day
    • 1 in 131 emails contains a malware
    • 43% of cyber-attacks are aimed at small businesses.
    • A data breach will cost the average company about $3.8 million
    • By 2019, cybercrime will cost businesses over $2 trillion - a 4-fold increase from 2015

    With these facts in mind, it’s evident that cyber-attacks are growing in prominence on a daily basis – from influencing major elections to crippling businesses overnight, the role cyber warfare plays in our daily lives should not be underestimated. In fact, multi-billionaire investor Warren Buffett claims that cyber threats are the biggest threat to mankind, even more so than nuclear weapons threats.

    How Can ClearCrypt Help?

    A cyber-attack in your organisation isn’t a matter of “IF,” but “WHEN!” At ClearCrypt we can help you protect and backup all your sensitive company and personal data.

    We offer a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all needs and requirements.  

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    For more info about the ClearCrypt range, click here

  5. 6S6A0949

     

     

    From students to industry professionals and experts, we all use technological gadgets to help us in our day to day lives – and none other than the humble USB.

    USB stands for “Universal Serial Bus” and is a portable, removable and rewritable data storage device which can serve many purposes in the business world and in our own personal lives. In comparison to previous storage devices including CDs and floppy disks, USBs are much more versatile as they are not prone to magnetic interference, surface scratches and are much faster, durable and reliable. 

    The application is widespread and I’m sure we’ve all used this small reliable device at some point in our professional careers and in our personal lives. However, with the rise in cloud connectivity and more business applications moving toward cloud-based services, the question now becomes;

     “To USB or Not to USB?”

    Internet Connection

    The emergence of cloud services means you can now upload, download, view and edit your data on a multitude of devices whenever you have an Internet connection. This may sound like a huge advantage however, no internet, no access to your data. This is where the humble USB takes the upper hand. Wherever you are, with or without an internet connection all you need is computer and a USB port. Perfect for business travellers or at times of power outages.

     

    Privacy & Security

    Cloud services, at the minimum, require you set up a username and password that is used each time you log in to the service. Depending on your cloud storage provider, it may offer additional security features like two-step verification and data encryption to further protect your sensitive and valuable data.

    A USB generally requires little to no setup before you can start using it but if you don't take additional steps to encrypt or protect the data, anyone who finds the device can access it. However, there are USB products on the market that add an extra layer of security, such as encryption, to further safeguard your data.

     

    Pricing

    After the initial cost of the USB, you own the device outright and there's no need to pay monthly fees to access your data. Cloud services may offer small amounts of storage at no cost, but most have monthly or annual fees that increase with the amount of storage space you require. Google Drive, for example, charges up to $50 a month for 1TB of storage space.

     

    ClearCrypt – Industry Leading Encryption

    In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity, and this is where ClearCrypt come into play.

    ClearCrypt is a range of 256-bit Encrypted Storage Devices designed to be robust, secure and cost effective while offering industry leading encryption and a product range to suit all needs and requirements.  

     

    Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss. The ClearCrypt range of devices are designed to make this cost effective, flexible, easy to achieve and with speeds up to 5GB per second, they are 10x faster than the normal USB 2.0 drives.

    You can find out more info about ClearCrypt, our products and how they can serve you and your organisation by clicking here