wonderfully unique software solutions

How iStorage secure flash drives help a council comply with GDPR

Regulations on handling personal data place additional responsibilities on organisations, with risk mitigation assisted by secure backup practices — as Kettering Borough Council has found.

The UK council sought to ensure compliance with the EU’s General Data Protection Regulation (GDPR), with failure to comply risking heavy financial penalties for data breaches or losses levied by the UK’s Information Commissioner Office (ICO).

A spokesperson for the IT team at Kettering Borough Council says that after considering two possible vendors for the purchase of encrypted flash drives to help meet GDPR requirements, the local authority chose datAshur USB drives.

“We found that iStorage seemed to have the best product in the market for what we wanted to achieve,” he says.

“The drives have been easy for the team to learn and use and have met expectations on being a secure solution.”

The Northamptonshire council aims to support some 100,000 residents of the county, with leisure, housing, planning, and business services.

Organisations can keep personal data safe

Comprehensive and effective policy and solutions typically include secure offline backup that can be disconnected from the network, keeping data safe in transit and when stored — such as the datAshur range of flash drives from iStorage.

The vendor’s personal identification number (PIN) enabled and hardware-encrypted data storage and cloud encryption devices aim to store and protect sensitive data to military specifications. Strong encryption is key to privacy and confidentiality, it notes.

“Data rights are human rights,” according to iStorage. “Respect for consumers’ data privacy rights will drive organisations to go the extra mile to ensure data confidentiality.”

In a 2020 survey, around two in every five cloud databases were unencrypted. Yet organisations are under “constant attack” from malicious actors online, notes iStorage.

“Data should preferably be encrypted with a FIPS-certified, randomly generated AES 256-bit encryption key.”

( Image Wikimedia Creative Commons – licensed under CC BY 4.0 )

Recent Articles

N-able expands channel push with accelerated global support

Remote monitoring and management (RMM) specialist N-able is ramping up its support fot the distribution channel worldwide in a bid to increase...

Keeper Security finds multiple weekly cyberattacks on UK professional services

The IT systems of UK-based professional services and financial services providers are often attacked many times each week, according to a Keeper...

JetBrains previews new IntelliJ based Fleet IDE and editor

Developer tools company JetBrains has opened up public preview access to its Fleet integrated development environment (IDE) and editor.

Go beyond identifying known cyber threats ahead of Industry 5.0

Cybersecurity vendor Stormshield has warned that identifying unknown and future threats has become increasingly crucial for effective enterprise defences.

Bluebeam Revu eased redesign of historic West End arcade

Construction project software from Bluebeam has helped a contractor renovate an historic stone building near London's Piccadilly Circus. According...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox