The plan should also include having a contingency strategy in place for recovering lost drives. In addition to giving new hires a badge, company handbook and company email address, present them with an encrypted USB drive. The best time to develop such a plan is before you need to prove you have one The best time to begin indoctrinating employees on the need to use only company- approved USB drives are on their first day of work and orientations. If your company does not have such a plan and guidelines, your organization is at risk at every level – including failure to comply with any regulations, which usually entails a nice round fine. Incorporate encrypted USB Flash drives and policies into your organization’s overall security strategy. Build an encrypted USB plan: protect & comply So, Kingston has put together these eight easy-to-follow (and understand) tips on how to choose the best-encrypted USB flash drive for your organization.ġ.
Chances are your particular needs will fall somewhere in between. The key to doing that is making sure they choose the right USB drive, as they range in quality from a free tchotchke giveaway at a trade show to a $600 high-capacity, state-of-the-art data protection encrypted security drive. One thing cybersecurity experts agree on is that an organization’s use and promotion of encrypted USB flash drives as an additional security product and solution is crucial in keeping confidential information confidential, and, as a way to comply with new regulations. (See Cyber Defense Magazine article “New Regulations Governing Data Protection – Including the Use of Encryption – Now in Effect in the EU and New York State”, Jedition). So much so that government entities are busy toughening up existing regulations or issuing new ones, to wit: the European Union’s General Data Protection Regulation (EU-GDPR) and the New York State Department of Financial Services’ 23 NYCRR 500. Thankfully, this isn’t like a debate on pop tarts or toaster strudels, where there are two highly opinionated sides to the issue. With all of the hacking, breaching, stealing, and compromising of personal data going on in the world, there are probably very few people left who don’t appreciate the seriousness of the problem. By Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology