The U.S Chamber of Commerce estimates that an employee is 15 times more likely to steal from a company than a non-employee. Furthermore, the economic damages to this employee theft is estimated to be in the range of 20 – 40 billion dollars per annum.
The official Windows 10 rollout is almost here. After much anticipation, Microsoft will introduce its new operating system on July 29. WinMagic product experts are examining the new operating system’s security features so we can best advise our customers on what those features mean for regulatory compliance and overall security best practices.
Our previous blog posting established that storage encryption technologies, such as full disk encryption (FDE), and their associated key management functions should be separated from each other.
Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may surprise you.
What do you know about data encryption and decryption? Whatever it is, it might not be fully right. There are myths circulating about this topic, myths which can actually hurt your business. We’ve identified five of them, and explain why they’re wrong.
On May 21st WinMagic was chosen as one of the 2015 winners of the CATAAlliance Innovation and Leadership Awards. The CATAAlliance Innovation Awards celebrate the best in Canadian advanced technology and winners are recognized for their innovation, expertise, and leadership in Canada’s technology community.
Healthcare data is the most valuable data a thief can get their hands on. Last year Ponemon did a study, which found that of the 40 companies across 12 industries surveyed, that negligence or human error is the primary root cause of data breaches.
Wireless encryption is a security tool to protect a company’s network. The word “encryption” means to turn something into code. When IT professionals use wireless encryption, they are encoding the messages sent between a computer’s wireless adapter and a wireless router.