![]()
“You can plug your encrypted flash drive into a public computer when you remove it, it removes the temporary operating file so there is absolutely no footprint-no evidence of you being on that computer,” says Tim Sperling, President ENC.Īnd, even if someone were to gain physical access to the encrypted computer or see the vaults, without both the Encrypt-Stick flash drive inserted and the correct password, that information is coded and thus unreadable.ĮNC anticipated that a flash drive could get lost or become inoperable (perhaps you ran it through the wash). EncryptStick encrypts files at a rate 10 times faster that AES 256 (the federal government encryption standard) and takes up only 4MB of space.”ĮncryptStick also allows users to maintain anonymity. EncryptStick also enables “encryption on the fly”-the ability to edit documents within vaults while the files are encrypted. Open existing vaults, create new vaults and easily encrypt or decrypt any file by right-clicking and selecting from a drop down menu, or simply dragging and dropping the files into the folders. #ENCRYPTSTICK TRANSFER DEVICE REGISTRATION PASSWORD#When the password is entered, the vaults become visible. To use EncryptStick, plug the flash drive into the USB port. It’s directed to the flash drive and is known to only the user,” stresses Rusnak. “The password is not stored on ENC’s servers or on the computer. #ENCRYPTSTICK TRANSFER DEVICE REGISTRATION REGISTRATION#Using the unique registration code, follow the instructions to create a master password. #ENCRYPTSTICK TRANSFER DEVICE REGISTRATION SOFTWARE#To get EncryptStick, simply plug a flash drive into a USB port, purchase a license and download the software directly to it (not the host computer). This, combined with the user’s password, makes it virtually impossible to be decoded. #ENCRYPTSTICK TRANSFER DEVICE REGISTRATION SERIAL NUMBER#EncryptStick uses the unique ID or serial number of the flash drive as a part of those 512 bits of information to create that key. #ENCRYPTSTICK TRANSFER DEVICE REGISTRATION CODE#EncryptStick uses powerful 512 bit polymorphic encryption technology, which has never been broken or successfully hacked,” Rusnak proclaims proudly.Įncryption converts data into code by use of an algorithm that cannot be converted back or decrypted without a “key”. It prevents virtually any type of file-documents, videos, photos-or passwords from being stolen. It happens every day.”Īnd, while Rusnak can’t help people safeguard devices from physical theft or loss, he can help them protect their data.ĮNC has developed EncryptStick, an application that turns these low-cost, off-the-shelf flash drives into affordable, easy-to-use, highly secure data vaults. “Things will get lost… things will get stolen. Too often, they are left unattended, plugged into the USB ports on computers. They can be seen hanging from key chains, belt loops, and lanyards around people’s necks. According to the USB Flash Drive Alliance, from 2004 to 2008, the number of units sold rose from 59.5 million to 220 million, and the average capacity increased from 213MB to 1727MB. The proliferation of high capacity, pint-sized data storage devices-USB flash drives, memory sticks or keys, pen drives or thumb drives-increases exposure to data risk and creates potential goldmine for data thieves. The problem isn’t limited to laptops and hacked databases. “Not only can companies be adversely affected, the loss of information can spell ruin for families when banking and personal identity information falls into the hands of criminals.” Typically, most concerns are over the effect of the theft of the actual hardware… but the potential gain on the black market of the selling and actual use of stolen data would far exceed the nominal value of the equipment. Based in Pitt Meadows, BC, the company provides solutions to secure and transfer personal and professional data. For individuals, identity theft is becoming a more common threat,” states Ed Rusnak, CEO of ENC Security Systems. “The loss of data is certainly a major concern for personal privacy, especially in health care, insurance and financial industries. The Open Security Foundation’s gathers reported information about events involving the loss, theft or exposure of personally identifiable information-the statistics are mind-boggling. These are just two recent locals cases, but the phenomenon is worldwide. The information could have been transmitted to locations unknown. Within a month, in a separate incident, private medical files of 11,000 Albertans within AHS were put at risk as a virus intermittently took snapshots of screens of computers that access that data. In June 2009, Alberta Health Services (AHS) reported two physically locked down laptops stolen from a lab at the University Hospital. Even worse, imagine your name is on the list. Imagine you’re a medical technician and your laptop just got stolen… Imagine the stress over the fact that it contained samples of about a quarter of a million lab tests for reportable and communicable diseases, plus identifiable names and personal health numbers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |