Verbatim Remote 4GB 43975 User Manual

Product codes
43975
Page of 11
18
19
Verbatim Security Micropage
Best practise – 10 Tips for Dummies
Keep up-to-date - Visit us at
www.verbatim-europe.com/security
6. Use Personal Online Management
Personal online management is a second line of 
defence. If someone unauthorised manages to get 
hold of your device, personal online management 
gives you the ability to block or unblock your drive 
remotely – so no one can even enter a password 
any longer. Or you can even set a ‘poison pill’ and, 
without the unauthorised person even realising it, all 
data will be deleted next time he or she goes online. 
This extra protection helps to increase security.
7. Manage Remotely
Depending on the size of business it makes sense to 
manage all secure drives through the IT manager. In 
this case, your IT manager has access to all USB sticks 
out there and can control their access, blocking one 
if needed (for example, if some bright spark’s left 
their mobile storage in a taxi).
8. Protect Against Viruses Too
Besides encrypting your data, you also need 
to ensure that it’s virus free. Anti-virus software 
exists on host computers (laptops or PCs). Or, for 
example, Verbatim offers USB drives or Express 
Cards with anti-virus software embedded, so you 
can keep your data safe even if you’re outside your 
company environment simply by using an anti-virus-
embedded USB stick.
9. Use ExpressCards
SSD ExpressCards don’t stick out and are therefore 
almost invisible. You can use them easily in modern 
laptops and notebooks, and they don’t increase the 
physical footprint of the computer. 
10. Act Now!
Don’t wait until your data’s gone. You have a legal 
obligation to secure sensitive data. Losses can harm 
your organisation and your private assets.
Mobile Data Leakage for Dummies  
By Guy Bunker and Gareth Fraser-King
WILEY-VCH Verlag GmbH & Co. KGaA
1. Identify Your Sensitive Data
In order to protect your data you fi rst have to identify 
which of your data is sensitive and needs protection.
2. Use Hardware Encrypted Storage for 
  All Sensitive Data
Hardware encryption may be more expensive than 
everyday drives but is still affordable, and safer than 
software encryption. Don’t give hackers and people 
who’d like to expose your loss on the Web a chance!
3. Set a Data Protection Policy
Setting up a policy to govern your data protection 
is crucial. Best practice shows that it takes time to 
set up a proper policy. In the meantime, your data 
leakage goes on, so you have to start protecting at 
the same time. Policy and introduction of hardware 
comes together.
4. Introduce Mandatory Passwords
Making passwords mandatory is the right choice to 
guarantee 100 per cent data encryption and protect 
your assets. You can get password-secured USB 
sticks that destroy themselves by formatting the 
whole content when someone tries to crack the 
password. You only get so many attempts to fi ll in 
the password. So when someone who’s not 
authorised to access the drive enters the password 
incorrectly more than a certain number of times, all 
data on the stick is deleted (so make sure you have 
a backup of your data).
5. Benefi t from Multi-passwords
If everyone encrypts their data with a secret key 
known only to the owner of the data, how can you 
share information with others? It doesn’t make sense 
to secure your data in a way that blocks users doing 
what they have to do. Multi-password capability is 
the solution.  With multi-password capability you can 
defi ne owner and guest user accounts. The fi le owner 
can then limit and control guest fi le operations. This 
way only users who are authorised are able to use 
the information. Without this feature, users will use 
unsecure drives again or open their secure drives 
for full drag and drop to an unsecured one.