DIGISTOR Digest
Securing Data at Rest
What Happens to a Company’s Reputation After a Data Breach?
As we noted in our last post “The Hidden Costs of a Data Breach,” one major data breach impact is lost revenue. Lost business can result from the reputational damage that occurs in the wake of a data breach. In our recent post, we referenced a Harris Poll survey...
The Horrible Hidden Costs of a Data Breach
Both small family-owned businesses and the world's largest companies are at risk of ransomware, malware, phishing and other attacks. Depending on the extent of the breach and the type of information stolen, the cost of a data breach can exceed millions of dollars....
What’s the Role of an Air Gap in Secure Data Storage?
Securing data at rest (DAR) is top of mind for security officers and IT departments. Ransomware, malware, and other cyber attacks can be protected in many ways, including what is known as an air gap or air-gapped network. But what is an air-gapped network? In an...
Over Nine Years Ago: Edward Snowden Leaks Critical Intelligence—Has Anything Changed?
It’s hard to believe that over nine years have passed since Edward Joseph Snowden leaked highly classified information from the National Security Agency (NSA). Snowden, who was 29 years old at the time, didn’t work for the NSA directly but was an employee of the...
DIGISTOR FIPS-Certified SEDs in Formal CC Testing
Great news for Data at Rest (DAR) security solution developers and customers! DIGISTOR has reached another milestone on the journey to obtaining Common Criteria certification and NIAP listing for all of our FIPS 140-2 L2 certified SSDs. DIGISTOR has recently received...
Multi-Factor Authentication: Use It!
The three commodities precious to most of us include our time, money, and personal information or data. Of course, these are all intertwined. Whether someone encrypts and ransoms our data, or if they simply corrupt or delete it, the result costs us. And if an...
Raising the Bar with FIPS + Common Criteria (CC) SEDs
When it comes to self-encrypting drives (SEDs), SSDs that automatically perform encryption and decryption as data moves to and from the drive, a buyer should take into account certain considerations. A secure drive should include pre-boot authentication (PBA), which...
DIGISTOR FIPS SEDs–Now With Common Criteria (CC)!
DIGISTOR FIPS 140-2 L2 certified self-encrypting drives (SEDs) are now available with Common Criteria certification (in process). The need for an additional level of assurance for encrypting and protecting Data at Rest (DAR) has never been higher for those in...
Cyberattacks Redux
Cyber threats have been in the news a lot since Russia began its war with Ukraine. It's hard to paint this as good news—the war is awful. But most of us are generally complacent about the possibility of cyberattacks. So maybe being a constant part of the news cycle...