View
134
Download
0
Category
Tags:
Preview:
DESCRIPTION
Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.
Citation preview
Next Generation Secure USB’s
Presented byJames Baker
Vice-President of SalesCtwo Products AB
(Secure Flash Division)
1
Meet Dr Lee
• Patient X-Rays• Patient Contact Details• Patient Case Notes
Dr Lee
2
Transporting Data
Liverpool Hospital Manchester Hospital
3
Data Loss
Data Protection Act Breach
4
Data Loss Incident
Sorry, we don’t
have you're files.
5
Data Loss Headache
ICO FINEDamaged Reputation
Stockport NHS fined £100,000 for
losing Patient Identifiable Data
6
Portable Data Discussion
We need to issue secure mediums for
transporting sensitive data.
We need to lockdown all
computer ports.
We need to block unauthorised
portable device usage.
We need to encrypt
data.
7
Removable Media Options• Super low cost• Portable• Can be encrypted
• Lack of computer DVD drives• Easily corrupted• Capacity limited
• Low cost• Ultra portable• Can be encrypted
• Easily lost• Risk of huge data loss• Needs computer to operate
• Doesn’t need a computer to operate• Portable• Patients can use to interact
• High cost• Expensive to manage• Not allowed in secure environments
• Can’t be centrally managed
• High capacities available• Options for management• Self contained, no battery
• Software to update
• Risk of huge data loss
Lets take a look at the options…
8
• Can be centrally managed
Removable Media Decisions
1. All computer ports will be locked down with a device control solution.
2. Restrictions will be put in place to stop unauthorised device usage.
3. Staff will be issued secure USB devices for securely storing and transporting sensitive data.
4. Transportation of paper files outside of hospital grounds will be severely limited and restricted to secure delivery methods.
Software Encryption
Strengths
• Low cost• Install on own USB• Works on cross-platform operating systems
Weaknesses
• Shares computer resources to encrypt data• Susceptible to brute-force attacks• Software can be removed and deleted• Slow performance
Hardware Encryption
Strengths
• Users a dedicated processor• Increased performance• Zero-footprint• Protects against physical attacks• Encryptions always on• Management options
Weaknesses
• Higher hardware costs• Firmware / software to update
A few decisions are made…
9
Hardware Encryption Costs
Market Analysis
USB memory Sticks and Flash Drives in USD $0
20
40
60
80
100
120
140
20112012201320142015201620172018
Taken from Hardware Encryption Analysis & Forecast (2013 – 2018) by Markets and Markets
10
USB Drive Market Volume
Taken from Hardware Encryption Analysis & Forecast (2013 – 2018) by Markets and Markets
Europe0
10
20
30
40
50
60
20112012201320142015201620172018
11
DSS ITSEC 2013
After much deliberation….A decision is made
12
Managed or unmanaged• Lower upfront cost• Quicker deployment• Less staff training
• Lack of visibility• No reporting• Can’t reset passwords
• More control• Drive visibility• Restrict access
• Higher upfront cost• Recurring support costs• Staff training
• Data loss risk increased
• Reporting• Reduced risk of data loss• Reset lost passwords
• Longer deployment timeManaged or Unmanaged
13
Hardware Based Managed Solution
Cloud
14
Next Generation Secure USB’s - Conclusion
• Hardware Based-Encryption• Ability to be managed• Cross Platform Support• Super Fast (USB 3.0) Speeds• Ability to be updated – (New OS Support)• Low to High Capacities• Small Form Factor (Portability)• Tamperproof & Waterproof
15
DSS ITSEC 2013
Paldies!
16
Next Generation Secure USB’s
Presented byJames Baker
Vice-President of SalesCtwo Products AB
(Secure Flash Division)
1
Recommended