Insights | DataLocker Inc.

DataLocker Blog

FEATURE STORY

DataLocker Introduces Sentry 5: The Ultimate Hardware Encrypted USB Flash Drive for Compliance and Security

Read More

Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.


October 5, 2021 | DataLocker Blog

As cybercriminal activity rapidly progresses, threats to economic and national security are exponentially expanding. While the Defense Industrial Base (DIB) sector and the Department of Defense (DoD) supply chain continue to be prime targets, these malicious attacks jeopardize technological advantages and national security. The DoD is working with industries to protect unclassified information within the […]

Read more


How Should Small Businesses Prepare For CMMC?

October 5, 2021 | DataLocker Blog

Should Your Business Worry About CMMC? The short answer is yes. If you’re a contractor working with the DoD or even as a subcontractor on DoD projects, expect these new requirements to apply to your business soon. The DoD estimates that by the end of 2021,15 contracts will include CMMC requirements, and by 2025, 479 […]

Read more


Does your business need CMMC?

October 5, 2021 | DataLocker Blog

Suppose you were to visit the break room of one of the vendors for the Department of Defense. In that case, chances are that the government’s new Cybersecurity Maturity Model Certification (CMMC) compliance standard is a water-cooler hot topic. Still, there’s a lot of confusion surrounding it, primarily because the folds and kinks are in […]

Read more


October 5, 2021 | DataLocker Blog

Key Terms Audit – the process of assessing an organization’s cybersecurity maturity in order to achieve CMMC compliance. CMMC evaluates contractors on a range of five compliance levels used to assess the risk they pose when they use, store, and transmit data. Assessment – the process organizations use to identify their CMMC readiness gaps with […]

Read more


government

October 5, 2021 | DataLocker Blog

CMMC Frequently Asked Questions What Is CMMC? The Cybersecurity Maturity Model Certification is a unifying standard for the implementation of cybersecurity across the Defense Industrial Base (DIB). It is designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Does My Business Need To Be CMMC Compliant? Only if you handle contracts with […]

Read more


most secure encryption

September 15, 2021 | Shauna Park

Which Form of Encryption is the Most Secure? Remember back when data breaches were something we heard about every once in a while? Nowadays, reports of them are as reliable as sports scores on the daily news. The constant threat has companies scrambling to not only protect information clients trust them with, but also to […]

Read more


September 15, 2021 | Shauna Park

What is an Encryption Certificate? The National Institute of Standards and Technology, or NIST, defines an encryption certificate as “a certificate containing a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish or exchange a session key for these same purposes. Key management sometimes refers to the process […]

Read more


password encryption

September 15, 2021 | Shauna Park

Are Passwords Encrypted? Passwords are one of the most important security features available today. Creating secure and unguessable passwords is becoming more complex, let alone remembering the many passwords we use daily. Many websites are programmed not to allow easily guessable passwords, but strong passwords aren’t enough to keep cyber thieves away from your information.   […]

Read more


hashing and hash functions

September 15, 2021 | Shauna Park

What Are Cryptographic Hashes? If you’ve found yourself wondering what exactly hashing is, it’s essentially a mathematical algorithm mapping and compressing data. This can be any data – a name, date of birth, a file, or a transaction. The data can be any size during this process, from something as big as 200 megabytes to […]

Read more


AES vs other forms of encryption

September 15, 2021 | Shauna Park

As cyber threats become a daily occurrence, it’s more important than ever to understand the different types of encryption. In past weeks, we’ve covered several topics around encryption, and now we’re going to take a closer look at the various encryption types. Quick Encryption Recap – Encryption is the process of making readable data unreadable […]

Read more