News & Insights

stock photo-1 optimize

Are You Ready Enough to Face Cyber Attacks?

Protecting your business is crucial for your business continuity. Not only your physical assets, but the same thing also goes with your digital assets.

post_covid_cyber_security_in2022

Post-Covid Cyber Security in 2022

In a Policy brief by CIPS on Cybersecurity Protection in Indonesia, the Indonesian National Cyber and Crypto Agency (BSSN) reported 290 million cases of cyberattacks in 2019

qanda

Frequently Asked Questions

Which key is right for me? Before making a purchase, We recommend taking the “Find the right YubiKey” quiz on the Yubico Website to determine which YubiKey is right for you

nittoh

Info Security Europe Event for Information and Cyber Security

Info Security Europe Event for Information and Cyber Security Infosecurity Europe is the sourcing and knowledge hub for Europe’s information and cyber security community

s3

Japan IT Week Spring 2019

Japan IT Week is truly world’s leading trade show where you can find any kinds of latest IT technologies/solutions

feeding-cd-bc7a0e630eaec5fa88f6c04d6d122fe1

Optical Media Destruction

Optical media refers to data storage devices that digitally write and read data via a laser diode.

mixed_media2_e9ce0927fc7891d812328129e44f0165

Mixed Media Destruction – Choose Versatility

As storage media evolves, security professionals are faced with ever changing destruction challenges.

drive-with-erased-label-37e3c30ec774950908a517cc30ecb7c6

Degaussers – How Can You Be Sure the Data is Gone?

To be certain they are functioning properly, NSA Guidelines suggest that degaussers “should be re-tested periodically according to manufacturer’s recommendations”. Many new degaussers feature a magnetic field strength indicator that provides instant feedback to the operator. If the indicator displays the minimum required field strength or greater, the unit will display a PASS/FAIL based on […]

Understanding_Levels_1_dd339c2d6dbb1cd09214b796cb8974cd

Degausser Technology – Types of Degaussers

There are two basic technologies used in Magnetic Media Degaussers to sanitize storage media. One is based on Permanent Magnet Technology and the other on Electromagnetic Technology. Both types are capable of generating powerful magnetic fields. Electromagnetic Degaussers Electromagnetic degaussers remove data from magnetic media (hard drives, data tapes, etc.) by applying a very large, […]

AdobeStock_108348058-768x434

Sarbanes-Oxley and Data Destruction: How to Best Comply

f you operate or manage a public company or a non-public company with publicly traded debt securities, you’ve certainly heard of the Sarbanes-Oxley (SOX) Act of 2002. This law is also aptly referred to as the “Corporate and Auditing Accountability and Responsibility Act” or the “Public Company Accounting Reform and Investor Protection Act”.  The SOX Act was […]

GDPR-on-servers-768x480

The Impact of GDPR on US Companies and Organizations

With GDPR (General Data Protection Regulation) in effect for almost a year now, even US-based companies are feeling its impact and the need to comply with stricter data security policies. Indeed, it likely won’t be long before the US creates its own set of national data privacy laws that all organizations will have to follow. […]

Searching-in-Store-1024x645

Credibility Counts, Ask Around

We’ve all had a point in our lives when we need to purchase something that we know we need but don’t know much about. Maybe you’re in a store looking for something, with eyes frantically browsing the shelves looking at all the different items. Trying to distinguish the difference between all the various products, versions, […]

data-breach-broken-lock

The Top 5 Ways Our Personal Data Gets Compromised

It seems like we can’t go a week without hearing about a data breach or a situation in which personal data has been compromised. Unfortunately, cybercriminals are becoming more sophisticated in their antics and there is very little we can do to stop cyber attacks from happening. We can, however, arm ourselves against hackers and […]