BLOG

Bellridge Admin Bellridge Admin

Kanguru Recognised Among Top Ten Encryption Solution Providers By Enterprise Security

Kanguru is proud to be named among the Top Ten Encryption Solution Providers by Enterprise Security Magazine for 2018.  Kanguru provides unparalleled data encryption products to help ease the security concerns of organisations around the world, offering complete military grade protection.     

Kanguru top 10.jpg

Kanguru is proud to be named among the Top Ten Encryption Solution Providers by Enterprise Security Magazine for 2018.  Kanguru provides unparalleled data encryption products to help ease the security concerns of organisations around the world, offering complete military grade protection.     

Kanguru is a U.S.-based manufacturer of military grade, Defender® AES 256-Bit, hardware encrypted USB data storage drives that can be configured, deployed and remotely managed by organisations to maintain the highest level of security. Kanguru is the only source for a one-stop solution of fully-integrated hardware encrypted USB drives with the option of cloud-based, enterprise-level remote management. Kanguru Remote Management Console (KRMC) is a robust remote management solution for which organisations can monitor, manage, and report on their deployed Kanguru Defender encrypted flash drives, hard drives and SSDs.  There is even an option to remotely wipe or disable drives in the event they are ever lost or stolen.

“Our goal is to provide convenient and easy-to-use solutions” says Don Brown, CEO of Kanguru. We pay very close attention to the market needs… to secure data and protect information.”

Security-conscious organisations around the world trust Kanguru’s encryption products to secure their data and meet industry regulations. Standards in healthcare such as HIPAA, and other regulations like GDPR, Sarbanes Oxley and GLBA are met with Kanguru’s robust, easy-to-use solutions. 

“Top 10 Encryption Solution Providers – 2018” by Enterprise Security Magazine

 

Read More
Bellridge Admin Bellridge Admin

Kanguru Solves Data Duplication Needs for Growing Organisations

Kanguru takes data duplication to a whole new level, with a flexible range of scalable duplicators to fit any budget, helping growing organisations achieve their data duplication goals. 

Kanguru-Duplication.jpg

Kanguru takes data duplication to a whole new level, with a flexible range of scalable duplicators to fit any budget, helping growing organisations achieve their data duplication goals. 

Kanguru manufactures high-quality, TAA Compliant duplication systems, and has been a driving force for the market for over 20 years. Clients have learned to trust Kanguru Duplicators for their data cloning needs because of their convenience and quality. Whether it be simple one-offs for back-up purposes, a few cloned devices for small business needs, or thousands of peripherals for enterprise, Kanguru’s wide-variety of high-speed duplicators maximises duplication jobs for CD, DVD, Blu-ray, hard drives, solid state drives, USB flash drives and other needs.  

Several key features of Kanguru Duplicators are:

  • Create multiple duplicates simultaneously

  • Easy-to-use LCD display

  • Ultra-fast copy speeds

  • Multiple copy modes depending on duplicator type (Disk mode, Brief Copy, Resize, Smart Copy, Synchronous, Asynchronous)

  • Secure Data Wiping / Erase

  • Stand-alone operation – no need for a computer

  • Daisy-chain connectivity (select models)

  • Built-in Internal hard drive (select models)

  • TAA Compliant

Daisy-Chain Connectivity

More recently Kanguru has expanded its line of duplicators with the KanguruClone™ PRO series, offering convenient daisy-chain connectivity for mass reproduction at staggering quantities. For example, with the KanguruClone 23HDS-PRO, up to 23 hard drives or solid state drives could be reproduced simultaneously. If an organisation had stronger needs, another KanguruClone 23HDS-Pro could be daisy-chain connected, providing up to 46 duplications at one time. Linking up to 4 systems together (max) renders an impressive 92 simultaneous duplications simultaneously - at up to 12GB per minute.

Even more remarkable is the daisy-chain connectivity of the 15 Target, 24x DVD Duplicator with built-in hard drive, which can support up to a colossal 60,000 connected Kanguru 15 Target, DVD duplicators at once, for a mind-blowing potential of 900,000 cloned DVDs simultaneously.

Migrate from HDD to SSD with Resize Copy

The updated Resize Copy mode on the KanguruClone HD SATA Pro Duplicators make it possible to clone a hard drive (HD) to a solid state drive (SSD) for better OS performance. Solid State Drives offer great performance benefits, but can be more expensive than traditional hard drives. Organisations looking to migrate their hard drives to more efficient, faster SSDs can do so quickly and easily with the KanguruClone HD Pro series.


Duplicators with built-in Internal Hard Drive

Certain Kanguru Duplicators even come with built-in internal hard drives with up to 500GB of space for superior performance of multiple, repeat jobs. With the job counter, custom production runs are a breeze.

To learn more about the Kanguru’s line of Blu-ray, DVD, Hard Drive, and USB Duplicators, call Bellridge at 02 8904 0172 or visit kanguruaustralia.com.au.

Read More
Bellridge Admin Bellridge Admin

Kanguru Offers A Unique Hybrid Approach To Data Security With KRMC™

Ask any security-conscious organisation what their biggest challenge is, and most will likely admit securing data in today’s digital world.  Ensuring that private data is safe should be a top priority for every organisation given present online threats, but with many options to choose from, how do organisations know what the best choice is for keeping data secure?  Data is the most important asset for any organisation as it drives business and is a key part of its infrastructure. 

KRMC-and-Kanguru-Defender-Encrypted-USB-Drives_large.jpg

Ask any security-conscious organisation what their biggest challenge is, and most will likely admit securing data in today’s digital world.  Ensuring that private data is safe should be a top priority for every organisation given present online threats, but with many options to choose from, how do organisations know what the best choice is for keeping data secure?  Data is the most important asset for any organisation as it drives business and is a key part of its infrastructure.  Hackers know this, and may stop at nothing to break in and steal valuable data.  As a result, government is cracking down with tougher regulations on organisations to protect the private data of its customers and citizens, with some steep fines for violating compliance. On top of that, citizens are being empowered with many rights to file lawsuits if one feels their private records have been compromised in any way.  Organisations need to consider not only what’s convenient for their business, but what is the best security option to protect both the data of their customers, and to protect themselves.


Cloud Storage VS Local Storage

Over the last decade or so, organisations have been making tremendous shifts to store their data in the cloud. There are advantages; convenience being the most prominent, with other benefits like backing up data to an offsite location in case of disaster. Popular cloud storage services, however, have seen some major data breaches over the last few years, prompting many organisations to wonder just how safe they really are.  The convenience of having access to your data from any internet connection anywhere in the world could also unfortunately be its security downfall, as others might find ways to gain unauthorised access to it as well.

Local storage like encrypted USB flash drives, hard drives and solid state drives on the other hand, cannot be compromised when closely guarded in the hands of the owner under password protection. In contrast to cloud storage, its usage is solely limited to the person holding the device under password protection- disconnected from the internet and the rest of the world. The very nature of its restrictive intent makes it the securest way to protect data, but it can be challenging if an organisation needs to use that closely-guarded information in a variety of locations around the globe. The danger is reversed if an untrustworthy individual with a USB device suddenly chooses to unlawfully use a device to remove private information from an organisation.   Without being able to monitor such data loss, the damage control could be enormous unless there was a way to remotely wipe and destroy the stolen drive.  The logic behind Kanguru Defender’s encrypted USB drives with fully-integrated Remote Management is precisely for administrators to have the ability to remotely manage their encrypted drives.


A Hybrid Approach To Secure Data Storage

Kanguru offers a unique hybrid solution which combines the outstanding security of local secure USB storage, with the convenience of management through the cloud, KRMC-Cloud™, (Kanguru Remote Management Console).  Enterprise and security-conscious organisations around the world have been using KRMC for many years to successfully protect their data. By storing sensitive information on local USB encryption, and using the cloud to manage their drives around the globe, IT Administrators can monitor their data assets without compromise.

This fully-integrated, hybrid approach offers a robust, secure, two-fold process of checks and balances for organisations, putting tremendous safeguards in place for Administrators and sensitive data that is unparalleled by cloud storage. Since data is stored solely on the local secure USB drive under strong AES 256-Bit hardware encryption and not in a cloud interface, it cannot be compromised through internet connections.  Simply put, Administrators manage the security perimeters of the drives while the users manage the sensitive data separately. The authorised user holds the information confidential and is able to use the drive under the permissions provided by the organisation.  The Administrator or Sub-Administrators use the convenience of the cloud to remotely manage the security, monitor and grant permissions, ensure the integrity of the secure USB drive’s security and report on any concerning activity.

The IT Administrator can configure and deploy a fleet of Kanguru Defender® hardware encrypted USB drives beforehand with specific permissions or restrictions accordingly, manage password guidelines, set a master password, and more, based on the security policies of the organisation. Then with KRMC Cloud, remotely manage the location, permissions, rules and security of the drives anywhere in the world.

Encrypted USB drives can be closely monitored, with specific permissions or restrictions. If a user forgets a password, Administrators can reset it remotely. If a user loses a drive, or it is stolen, the admin can remotely disable, delete or even wipe the drive.  Administrators can provide reports, schedule actions, and even send a message to drives, making quick policy changes.

This safeguard system can even be ideal for use in different departments, with sub-administrators managing silos of information to end-users of specific sectors, and one super-administrator managing the big picture. 

KRMC and Kanguru Defender hardware encrypted USB drives is a robust, hybrid system that helps organisations maintain full security of their data with the freedom to use it wherever it is needed around the world, while keeping an administrative check on the location of the data at all times.

Read More
Bellridge Admin Bellridge Admin

Ten Superhero Ways To Protect Your Data From Getting Hacked

Data-greedy villains are constantly lurking in the shadows, ready to take full advantage of their next victim.  They prey on every opportunity they can find to get their hands on personal and sensitive data for their own personal gain. Though online hacking is today’s “Gotham City,” criminals have used similar tactics to breach personal information and scam people and organisations for centuries.

you've-been-hacked.jpg

Data-greedy villains are constantly lurking in the shadows, ready to take full advantage of their next victim.  They prey on every opportunity they can find to get their hands on personal and sensitive data for their own personal gain. Though online hacking is today’s “Gotham City,” criminals have used similar tactics to breach personal information and scam people and organisations for centuries.

The good news is that with a little education, awareness, and some savvy sleuthing, you can be a superhero to protect yourself, your family, and your organization from these scoundrels and their vicious, evil tricks and deceptive tactics.  Never let your guard down, especially when your emotions are about to override - be wise, use your instincts and always be one step ahead of their evil tricks. 

Here are a few evil tricks villains use, and the Superhero counter punches you can utilise to thwart their evil ways.

Evil Trick #1: Deceiving You With Fake Emails

I received an email just the other day in my personal email box that looked very much like it was from my bank, telling me that my online account had been compromised and locked out, so I needed to login with “this link” to reinstate my account. It looked official, with the bank’s logo, bank address and even branded graphics and colors.  In a brief moment of blind shock and anger that came over me thinking that my account had been compromised, I almost clicked on the link, but something didn’t feel right. I hovered over the link instead without clicking to see where it would go, and sure enough the link was an unusual, false link that would have taken me far away from my bank’s secure domain.  When I typed in my bank’s URL directly into a browser and logged in to my account, there was no issue, no lockout, no compromise. I compared the email to other emails I had received in the past, and only then it became quite clear that it was a fake email.

These email tactics are becoming more and more popular, and hackers are getting better at their evil deceptions with them. The malevolent trick here is to get you to override your intuition by giving you an emotional situation that will make you blind to your own instincts. 

They also try to blanket as many people as possible, by sending emails that look like they are from large accounts or big name brands- like large banks, retail brands, or popular social media sites to try to ensnare as many people as possible.

They send emails that claim an attached invoice is in severe default and you are being demanded upon for immediate payment, or your paypal account has “expired” and needs to be renewed, or your bank is asking for verification of your login information, or your grandmother is stuck in Cuba and is in desperate need of immediate cash. Clicking on links in these emails can lead to downloading viruses, loss of money, gaining access to your accounts, or even downloading malware, which could get into your computer and wreak havoc on your system and network.

 

Superhero Power Punch #1:

  • Be scrupulous with emails using X-ray vision. Always scrutinize an email first – even ones that look official from your bank or favorite retailer, by taking a closer look at it. True we really don't have x-ray vision, but you can examine an email first with a level of scrutiny that will protect yourself from clicking on something malevolent. Don’t click on any links unless you have fully assessed the email to ensure it is from a trusted organization. Don’t let your initial emotions of an email draw you in to clicking right away on a link. Instead, if you have an account, go directly to the website URL of your account in a browser and login from there.  Even something as simple as a Facebook notification could be counterfeit, and clicking on a link could lead you to a malicious website. If you have questions about an email, call the organization directly.

  • Watch for bad English or grammar. If you find grammatical, punctuation and spelling mistakes, chances are it is fake. Hackers are getting better at this, but still they will often leave something out, or misspell words that can be a vital clue or a red flag. 

  • Watch for strange or unusual hyperlinks. If the text appears to be legitimate, double-check the link by hovering over it (without clicking on them), the hyperlink on the word should reveal as a popup with the first part of the link being the secure domain of your account like www.yourbank.com.  If it looks nothing like the domain of your account, or looks weird, DO NOT click on it. Also watch for links that look official, but aren’t. Links like Amaz0n.com or linkedn.com may look legitimate, but a misplaced zero for an “o” or a missing "i" could make all the difference in the world.

  • Look at the recipients. The recipients of an email can often be a clue also as to the validity of an email. If an email was sent to “undisclosed-recipients”, instead of just you, consider moving it immediately to your spam folder.

  • There are often other clues as well to watch out for. Always question the validity of the email. Sometimes subtle clues can tip you off that something is wrong. For example, an email you receive on a regular basis may suddenly be missing key brand elements or something doesn't look right. If the subject seems suspicious, delete it. If the sender is suspicious, delete it. If it seems too good to be true, delete it. If it’s from someone or an organization you know, but only has a hyperlink in it with no message, delete it.  Your instincts are vital for discerning valid email from the bad. 

Evil Trick #2: Stealing Your Precious Jewels

It’s no secret that the crown jewels of hackers are credit card numbers, bank account numbers, retail account numbers, passwords, birth dates, addresses and social security numbers, yet it is still surprising how many individuals pass out this information to anyone like it were free cheese samples.  Keep this information protected at all times and never freely share it with anyone- either online, over the phone, or in person.  Often times though, websites or organizations you are affiliated with might ask you to verify this information, and you will have to use your good instincts.  If your conversation is with a legitimate account you have worked with in the past, they should have this information already. If you can pass on providing this information again, avoid doing so, otherwise, challenge them, and ensure first that the person you are verifying this information with is a trusted employee of the organization you called, and/or that the website is secured with “https” and is a legitimate website of the organization.  Often times though when challenged, an organization may ask for a PIN number instead to validate whether you are the right person.

 

Superhero Power Punch #2:

  • Never give out this information freely to someone who has cold-called you or sent an email to you, as this could be an attempt to steal your information. Legitimate organizations will not cold-call you and ask you for this information over the phone. They may ask you only if you called them directly, in order to verify if it is you. Hackers are using this trick all the time to prey on the elderly by calling them and pretending to be something that they are not. Never give out any information to someone who has called you directly no matter how legitimate it sounds.

  • Protect your personal information at all times. Be very meticulous with whom you share your account numbers, social security number, password, birth date, and address by checking and verifying with whom you are talking to. Challenge those who ask you for this information, and if a PIN number is acceptable for verification, go that route instead.

  • Carrying a hardware encrypted flash drive containing your personal information is ideal for this purpose. Your files are password protected, preventing any unauthorized access to your files, even if you lose it (have a secure backup somewhere else just in case). Kanguru has a number of flexible options in the Kanguru Defender® Family of hardware encrypted drives

  • Keep personal tabs on where your personal information might be, and be watchful. It’s unfortunate, but in today’s hacker-hungry society, it is important that we are conscientious wardens of where our own personal information is stored. Your doctor’s office, last hospital visit, banks, mortgage lender, tax preparer, employer, cable company, government, registry, utilities, credit cards and favorite retailers all keep personal information on you. If you notice a security breach, a move, an office/store closing, or even a death, be proactive and ensure that your data is protected. Watch your online accounts, and bank statements carefully and often for any suspicious activity. Report it immediately if you see activity that you are not familiar with.

  • Never give out personal information to someone that sent you an email or cold-called you. This could be a malicious attempt to steal your data. If you must, hang up, and call the organization back with a phone number you already have in your own directory or from the official website. Verify that the phone number you are calling, or the website you are visiting is legitimate, secure, and trusted.  This simple procedure can help you be in control of your data.

 

Evil Trick #3: Your Trash Is Their Treasure

We throw away tons of paper each day with account numbers, passwords, social security numbers, birth dates, addresses and even scribbled passwords on them. Hackers know this and will stop at nothing to get this information. Dumpster diving, trash-picking, and even dump-sifting is a real problem.

It’s not just paper though, individuals get a new iPhone and throw the old one away, or they buy a new computer and toss out the old one without a thought. Even worse, people sell it or give it away without wiping their personal information off of the devices.

With technology changing almost daily, a device used to store data yesterday can be quite different from the device used to store data today, and even more different than the device we will use for tomorrow- leading to forgotten devices, lost devices, thrown away devices and even stolen devices.  Kanguru provides encrypted flash drives and hard drives that not only encrypt your personal data today, but keep it encrypted for the future.  If you forget your device, lose it, or it gets stolen, a password-protected device is the perfect solution for protecting your data not just for today, but for all time.

 

Superhero Power Punch #3:

  • After you pay your bills, shred them, or store them in a safe place until you can shred them.

  • Be meticulous with the information you throw away or recycle. If it contains any personal information, shred it first- Better to be safe than sorry.

  • Be mindful of old CDs, DVDs, floppy disks, videotapes, cassettes, hard drives, computers, mobile phones, and flash drives. Do not throw them away without ensuring that your data has been verifiably wiped. Then destroy them. Never leave even as much as an old floppy disk or zip drive available to be found and rummaged through. If your organization has a lot of hard drives that you want to wipe clean of sensitive data, Kanguru Duplicators have secure wiping functions that will permanently delete personal data. This is especially ideal for meeting the new GDPR requirements - (right to be forgotten).

  • Store sensitive data on password-protected devices. Protect data on Kanguru hardware encrypted flash drives and hard drives.


Evil Trick #4: Phishing Your Online Profiles (FaceBook, Linkedin, Instagram, etc.)

Another evil trick that villainous hackers will use is to study public online profiles for juicy information they can use to get access to other things in the future.  If your Facebook profile is not private, and contains personal information about you, hackers can use this information to gain knowledge about you, and use it to access other things.  Your posted email address can be used to drive Evil Trick #1.  Profile photos could be used to create fake profiles that could lead to disastrous results and identity theft.

Facebook is always trying to get me to confirm specific personal information like “where I went to school”, “where I live”, etc. It even wants me to confirm that certain people are family like an Aunt or Uncle in my account. This may seem innocent enough, but any hacker who searches this information would see personal data, which might often be used as security questions for personal accounts.

Facebook has also recently been under scrutiny in the news for allegedly selling personal information. Whether it is true or not, why provide more detailed information to something that is only going to use it to advertise to you?

Facebook is also notorious for obscure surveys, and cute cat videos.  Though they may seem harmless, fun and adorable, they could be evil ticking bombs placed by villains, and clicking on them could expose you to harmful scams, viruses and phishing.  Hackers could use them to gather intuitive information about you to ascertain account information, or even help guess passwords.  For example, if a survey reveals that your favorite color is red and you love fast cars, chances are good that you might have a souped up car in your garage, take risks, and have a password with “racer” in it.

 

Superhero Power Punch #4:

  • Keep and maintain strong privacy settings on your online social media accounts. Check that your settings are private, and only share information that you are comfortable with.

  • Don’t allow social media accounts to confirm your personal information. Why do they need to know? There is enough information already searchable on Google without providing even more juicy data for hackers.

  • Never post personal information that you do not want the world to see. Stay away from providing more details than you have to

  • Be meticulous with what you click on. Stay away from online surveys and clicking on suggested videos or advertisements.

  • Stay away from a new profile that wants to connect with you from a friend or colleague you are already connected with. This could be a sure sign that someone has hacked that person’s profile, and is trying to connect with you.

 

Evil Trick #5: Compromising Your Passwords

Strong passwords are great for protecting personal data and accounts, but far too many individuals are careless with them. Lazy passwords are a villain’s specialty.  If your password is “password1” or “Me123”, you might as well hand over the keys and pull out the welcome mat for hackers for full access to your accounts.

Sending passwords online through email or instant messaging communications is another way to open the door to hackers. If you email passwords, or send them through instant messaging, you may have just provided a hacker with the very keys they are looking for. Never assume these communications are secure.

Since the average person has over 25 different accounts, it’s often surprising how many individuals store passwords under unprotected means.  This could be a non-password protected spreadsheet or Word document, a careless piece of paper at your desk, or a post-it note on your computer screen.

Also, if you click on the box in the login window that says “Remember me”, you are providing every person behind you an open door to access your account if they can get onto your computer.

 

Superhero Power Punch #5:

  • Always protect your passwords. Never send passwords over online email or instant messaging communications. If you must provide a password to someone for a shared account for some particular reason, it’s best to deliver it orally, and as privately as possible.  Don’t forget to ensure that they will protect the password as well.

  • Never store your passwords by unprotected means. If you have your passwords on a spreadsheet, make sure that spreadsheet is password protected with a good password you will never forget. You can also carry an encrypted flash drive which would require a password to access all of your files. Kanguru Defender Elite30 is perfect for this.

  • Do not store passwords on a paper or post-it note near your computer.

  • Change your passwords often. This helps you keep one step ahead of any hackers who may be following you.

  • Never click the box in the password login window of your online accounts that says “remember me”. Although it makes it convenient, you are allowing the computer to save your password, which gives anyone full access if they are able to get onto your computer. Typing in your password each time only takes a few seconds, and can help you remember your password better anyway.

  • Don’t be lazy. Make your password something difficult to hack. If you have trouble remembering passwords or coming up with new ones, make up a system that only you can understand- like your favorite exotic foods, family events, or obscure cartoon characters with number/letter schemes mixed in that no one would ever know.

 

Evil Trick #6: Eavesdropping On Publicly-Accessible WiFi

We’ve all used them, but hotel, restaurant, and transportation public wi-fi network access is dangerous and should be avoided if possible.  Although eavesdropping goes all the way back to the old days of telephone operators, hackers snooping on today’s online activities could be far more destructive.

 

Superhero Power Punch #6:

  • Try to avoid using publicly-accessible WiFi networks if possible. At the very least, do not conduct financial transactions, credit card transactions, or provide personal information over these networks. 

  • If you must use public WiFi, check first to ensure that the network you are selecting is the legitimate one, by asking the front desk or receptionist what the correct setting is. Don’t select any settings that are similar which could be used by hackers as a trick to make you think you’ve accessed the service.

 

Evil Trick #7: Sending Fake Apps and Bogus Software Updates

It’s sad, but hackers may try to use opportunities where we usually trust the expertise of others, to hack and destroy.  Downloading apps on your iphone, or making software updates are no exception. 

 

Superhero Power Punch #7:

  • Before you trust those updates, it’s always best to check the original secure website first for more information. If there are ways to verify that the update is real, follow your instincts. If you don’t trust it, hold off.

  • Be aware that if you download an app, it most likely will gather information from you or gain access in one way or another. Be aware of dangers, understand what you are about to download, and always read the fine print.

 

Evil Trick #8: Decoy Links to Fake Websites

The internet is constantly changing to make transactions more secure with browser updates and security, and one particular area is the “https” or “Hypertext Transfer Protocol Secure”.  Websites that conduct confidential transactions are required to use the HTTPS extension, along with SSL certificates in order to verify the website.  This “handshake” between the SSL certificate, the secure domain, and the security of the browser verifies that a website has been vetted and is secure.  If you are conducting transactions on a website that does not show the HTTPS extension, you are doing so at great risk.

 

Superhero Power Punch #8:

  • Never conduct any transaction over a website that has “HTTP” or indicates an unsecure connection.Ensure that a secure lock icon shows in the URL, and that the URL begins with the “HTTPS” extension. These are standard browser configurations and are regulated for valid ecommerce. 

  • Again as in Trick #1, watch for strange hyperlinks that pose as a legitimate hyperlink. Double-check them first by hovering over links (without clicking on them.)  The hyperlink on a word should reveal a legitimate hyperlink, like www.yourbank.com.  If it looks nothing like the domain, or looks weird, DO NOT click on it. Also watch for links that look official, but aren’t. Links like Amaz0n.com may look legitimate, but a misplaced zero for an “o” could make all the difference in the world.

  • If you can type the URL directly into the URL window, do so. It may take longer, but that simple step could protect you from a lifetime of grief.

 

Evil Trick #9: "The "FREE!” Lure

One of the oldest tricks in the book are goods and services that are offered for “FREE”.  When a company or service wants to provide something for free, it is most often to get something in return.  If it is a legitimate free offer, they want your business in the future.  However, most “free” things nowadays in today’s digital age could potentially download surfing software, spyware, keylogging, or at its worst, load damaging viruses or malware.

On the soft side, advertisers use this technique to provide more targeted services, advertisements, or coupons by enticing you to buy into something free, and in turn you provide them with your name, email, phone number, address, and they can spy on your buying habits.

On the criminal side, free software downloads, apps, and “free offers” can lead you down the path of destruction with a malicious download.

Hackers could even go so far as to try to infiltrate an organization by manipulating a cheap thumb drive’s firmware and hijacking it with malware.  Then all they have to do is leave it precariously on a sidewalk or bench outside of an organization, and curiosity takes over. An employee, a student, or a staff member will pick it up, bring the rogue thumb drive inside and plug it in to see what’s on it. Voilà, the organization’s network is compromised.

 

Superhero Power Punch #9:

  • Be very cautious with free stuff. Do not give away personal information to “win a prize”.

  • Do not be immediately enticed by free offers. Test them first, check for legitimacy and ensure that your personal data will not be compromised, or you will be taken advantage of.

  • Do not be enticed to plug in just any cheap thumb drive - even if it’s just to find the owner. For organizations that have real concerns about a “badUSB” attack or malware, Kanguru Defender hardware encrypted drives contain digitally-signed, RSA-2048 secure firmware that protects from firmware-tampering, and can be whitelisted on a network or infrastructure with Endpoint Security, to fully protect the infrastructure.

 

Evil Trick #10: Finding The Unlocked Door To Your Data

And finally, storing personal data by unsecured means is by far the easiest way for hackers to steal your information. Storing personal data in the cloud with very little password protection is the first ticking time bomb, and storing it on an un-password protected computer or storage device is another.

 

Superhero Power Punch #10:

  • If you store personal sensitive information, be sure to store it using encrypted password protection. Kanguru Defender hardware encrypted flash drives and hard drives are ideal for data storage protection, and even include on-board anti-virus protection. By encrypting the data, you automatically prevent any unauthorised access to your sensitive data- and not just for today, but for tomorrow, and forever- even it is lost or stolen because only you have the password.

  • If your organization is concerned with monitoring the location of particular data on secure flash drives and data storage drives, Kanguru offers Remote Management for secure USB drives. Administrators can use remote management to set security policies, delete or disable lost or stolen drives, report on the location of drives, and even schedule password changes.

Read More