Protected data on the move and in the event of loss of a storage medium

In today’s world, the security of confidential data is critical. With the enforcement of the DSGVO and the increased awareness of the need to protect personal data, it is particularly important to protect and secure sensitive data more comprehensively.

Small storage devices such as USB sticks, SSDs or HDDs can be easily lost or stolen – more than 2 million devices are lost every year worldwide and studies have shown that more than half of lost USB sticks are actually used. This puts companies at great risk of not complying with the DSGVO. But photos, videos and important documents should also not fall into the hands of others in their private lives.

A simple step to reduce this risk is to use encrypted storage solutions. With hardware-based AES 256-bit encryption, data is decomposed so that only someone with the correct code or key can read it.

What does AES 256-bit encryption mean?

The abbreviation AES means “Advanced Encryption Standard”. It is a symmetric block cipher that is used all over the world to encrypt sensitive data. 256-bit refers to the length of the encryption key used to encrypt a data stream or file. A hacker or cracker therefore needs 2256 different combinations to crack a 256-bit encrypted message. It should be emphasized that AES has never been cracked before.

What is the DSGVO?

Across Europe, the Basic Data Protection Regulation (DSGVO) was introduced to strengthen the rights of individuals and ensure better data protection. It gives businesses a simpler and clearer legal field in which to operate and makes it easier for people to understand what businesses can do with their data.

High fines are imposed on companies that do not comply with the regulation. They can be fined 4% of the total annual turnover or EUR 20 million. All this makes it more important than ever to ensure that your critical and sensitive data is properly protected.

What are the solutions for keeping your data as secure as possible?

The Verbatim brand stands for “Technology you can trust”. Especially with sensitive data, trust and reliability play a central role.

The company has decided to expand its range of data storage media to include encryption technology that gives people certainty about their security and helps them avoid horror scenarios of illegal access to sensitive data. Verbatim relies on solutions with AES 256-bit hardware encryption and various access methods.

Fingerprint Secure HDD & USB

Fingerprint-secured hard drives and USB sticks use a combination of 256-bit AES hardware encryption and biometric technology for full information security. They encrypt all data on the drive seamlessly and in real time.

Both solutions meet DSGVO requirements because 100% of the drive is securely encrypted. The integrated fingerprint recognition allows access for multiple authorized users. The administrator can also access the device with a password. The hard disk does not store passwords on the computer or on the system’s volatile memory and is therefore much more secure than software encryption.

Keypad Secure HDD, USB & SSD

Here, too, AES 256-bit hardware encryption is used. In contrast to fingerprint recognition, here you rely on a built-in keyboard that is used for entering the numerical code.

If the drive falls into the wrong hands, the hard disk / SSD (USB stick) is locked and must be reformatted after 20 failed password entries. SSDs also offer higher speeds, improved performance and increased reliability.

Secure Pro USB Stick

As a basic version Verbatim offers a USB stick with password protection. Here, too, you can prevent unauthorized persons from accessing personal or business data if the USB stick is lost or stolen.

The Store ‘n’ Go Secure Pro offers numerous security features, including a password prompt, a password hash algorithm and a hacker protection feature that deletes data from the device after ten failed access attempts.

Whichever encrypted storage solution you choose, your data is in safe hands! An overview of storage media with AES 256-bit hardware encryption can be found here.

For even more security: The 3-2-1 data protection rule

Verbatim generally recommends to use the 3-2-1 backup rule:

– You should have at least three copies of your data.
– Store the copies on at least two different media.
– Keep at least one copy in a different location.

Leave a Reply

Your email address will not be published. Required fields are marked *