Kingston Offers Best Practices For Portable Data Security

rated by 0 users
This post has 1 Reply | 0 Followers

Top 10 Contributor
Posts 26,710
Points 1,208,340
Joined: Sep 2007
ForumsAdministrator
News Posted: Tue, Nov 8 2011 2:32 PM
Not only is Kingston in the storage business, it’s also in the business of conducting research and doling out advice--which isn’t a bad thing.

In a presentation titled “Best Practices: Using and Promoting Secure USB Flash Drives in Your Organization”, Kingston identifies some best practices regarding USB flash drives and data security. Flash drives are on one hand a terrifically practical means of transporting files; on the other hand, they’re one of the worst potential vectors for data breaches by dint of being small and easy to lose. Once a flash drive is lost, anyone who finds it can access the data therein if it’s not properly secured.

Kingston has a number of recommendations for shoring up that particular leak, including using secure flash drives and associated policies, determining a type (or it follows, a particular brand or model) that best suits your organization, training employees on flash drive use, and enforcing electronic storage policies.



The company conducted “extensive market research” and also gathered customer feedback to develop its best practices. You can read more about it on the Kingston Excryption Zone page of Kingston’s site.

Finally, yes--you should always be a bit wary when a manufacturer conducts research or develops recommendations about the types products it sells, as the company will likely recommend that you buy some of its wares to you as a result. With that in mind, feel free to take Kingston’s advice with a grain of salt, but these best practices are worth some consideration regardless.
  • | Post Points: 20
Top 50 Contributor
Posts 2,865
Points 29,645
Joined: Mar 2011
Location: United States, Connecticut

There are many solutions for secure flash drives but Kingston does make some of the best solutions. I think their ideas are certainly good to establish policies as well as using encrypted flash drives. The other solution that might work is using a smart phone with remote wipe capabilities.

  • | Post Points: 5
Page 1 of 1 (2 items) | RSS