DataLocker Blog

FEATURE STORY

DataLocker Launches the Most Secure Managed Large-Capacity USB Drive Commercially Available

Read More

Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.


AES Encryption

September 1, 2021 | Shauna Park

Developed in 1998 by Vincent Rijmen and Joan Daemen, two Belgian cryptographers, Advanced Encryption Standard, or AES, has been around for several decades. Originally referred to as Rijndael, AES is symmetric encryption, meaning it uses the same key to encrypt and decrypt data. By using the substitution permutation network algorithm (SPN), it encrypts through multiple […]

Read more


Asymmetric vs Symmetric

September 1, 2021 | Shauna Park

Encryption is critical to protecting sensitive information. A lack of encryption has led to massive data breaches, including a Microsoft customer support database of over 280 million customer records, a 500K breach of Zoom accounts, and much more. In previous articles, we shared the basics of encryption, but you also need to know about the […]

Read more


Data at rest vs. in transit.

September 1, 2021 | Shauna Park

Many people assume that when information isn’t being transmitted, it’s safe. But to effectively encrypt personally identifiable information, many variables must be considered, including the state the data is in. In order to understand how to encrypt data in various states, we first need to look at the differences between the three states of data: […]

Read more


Encryption, data, security

September 1, 2021 | Shauna Park

Every day, people share information across public wires that travel through a series of third-party databases. Even though it’s an open system, we continue to exchange personally identifiable information like credit card numbers, bank information, passwords, and emails. Between our smartphones, tablets, and other devices, we have data traveling through many connections – so, how […]

Read more


Why does encryption matter to organizations

September 1, 2021 | Shauna Park

Cyberthreats are a troubling daily reality, affecting everyone from small business owners to industry leaders. To make matters worse, people take more significant risks in cyberspace than they do in the physical world. Plus, the risks are harder to understand and they affect our risk vs. reward decision-making abilities. In the physical world, it’s easy […]

Read more


March 17, 2021 |

BJC is a non-profit healthcare organization operating in over 12 hospitals in the St. Louis area. They were seeking a way to ensure that employees could keep sensitive data protected, even in remote work environments. Download the full case study below to see how they kept their data safe  

Read more


February 25, 2021 |

Businesses are seeing more and more instances of data breach. What can you do? In our latest infographic we explore 15 ways you can prevent data breach. We cover industries ranging from public sector and healthcare all the way to finance and manufacturing. Click the image below to explore.  

Read more


February 3, 2021 | Katie Leverman

After succumbing to ransomware, businesses paid hackers an average of $84K to get their data back. And although the number of businesses reporting having been attacked by ransomware has gone down, it’s not because ransomware is happening less frequently. It’s because attackers are becoming more sophisticated and more targeted in their approach. Fewer businesses overall […]

Read more


January 29, 2021 | Katie Leverman

2020 was a rough year. While many of the year’s events were difficult to predict and perhaps unavoidable (COVID-19, wildfires, and civil unrest, etc.), many of 2020’s massive data breaches were predictable and completely avoidable. Perhaps the most noteworthy attack was the recent SolarWinds debacle in which Russian state actors entered the networks of several […]

Read more


May 16, 2020 | Katie Leverman

Thunderspy allows for evil maid type attacks against a host computer. Evil maid attacks require physical access to the victim’s machine and usually enough time to do something conspicuous such as disassembly. A successful attack will give the intruder direct memory access to the machine which gives them the ability to compromise all local security […]

Read more


March 24, 2020 | Katie Leverman

As many companies move to a remote teleworking environment there is increased concern about how to keep sensitive data at rest secure. What can be done to provide workers with secure and stable storage using DataLocker’s centrally managed software solutions?  Encrypt local data allowing offline work if the Internet becomes temporarily clogged SafeCrypt utilizes military-grade […]

Read more


March 19, 2020 | Katie Leverman

What if your “laptop” only weighed 9 grams, never broke down, and took 3 minutes to issue out? DataLocker’s managed, encrypted USB drives can be utilized as thumbtops: smaller, smarter, tougher, lighter, and cheaper than a laptop. They allow your organization to stay compliant, secure, and productive. Compared to online virtual environments and remote PCs, […]

Read more


December 16, 2019 | Aimee Gindin

The next generation of security and convenience is here—and it’scalled the Sentry K300! This micro SSD offers not just military-grade security with 256-bit encryption, but faster speeds for reading, writing, and transferring too. All the requirements you need It’s also the industry’s first platform-independent keypad micro SSD to incorporate an OLED display. That display can help you ensure […]

Read more


November 26, 2019 | Katie Leverman

DataLocker is honored to provide exceptional products and services for our customers all year long, but there is no better time than the Thanksgiving season to reflect on how much you mean to us! As we all prepare to wrap up another year, we want to take a moment to express our gratitude for your trust and partnership […]

Read more


October 28, 2019 | Katie Leverman

Storing and transferring data is getting easier and easier. And while that can mean time savings and convenience for your team, it can also create security problems and put your data at risk. Ease of use doesn’t necessarily mean secure, and that can be a big problem for protecting your organization’s information. That’s where encrypted […]

Read more


September 26, 2019 | Katie Leverman

Security breaches can be a big problem: for your customers, for your investors, for your business. And as more and more business is done digitally (and more and more information shared via mobile and cloud-based devices), there is more risk for a security breach. Preventing a security breach is best accomplished with a variety of tactics, […]

Read more


August 20, 2019 | Katie Leverman

Gone are the days when an organization’s data was accessed strictly on-site. The convenience of laptops, tablets, smartphones, flash drives, portable drives, and other mobile devices has opened up an entire world of possibilities and flexibility for how our teams operate. But it has also opened up new challenges and concerns for maintaining secure data, […]

Read more


August 20, 2019 | Katie Leverman

Your data deserves secure storage—and you deserve the confidence that comes with knowing your most important information is protected. But if you’re picturing a steel safe or a 75-character password, there are better options available for easily and reliably maintaining your secure data. When handling sensitive data, it isn’t enough to simply lock it down to prevent anyone from […]

Read more


July 31, 2019 | Katie Leverman

The ability to safely transport and store data, in most organizations, is just as important as the data itself. But many agencies, companies, and other establishments simply do not put as much thought into their drive security as they do into the information they are storing there—and that’s a mistake. Securing your drives is critical to ensuring all of […]

Read more


July 31, 2019 | Katie Leverman

There are few organizations that require higher security measures for their data than those in the military sector. From small agencies and mobile teams to larger bases and headquarters, maintaining secure data is an important component of successful operations. Here are three areas where data security for the military is most critical. Personnel Those who participate in military operations […]

Read more