DataLocker Blog

FEATURE STORY

DataLocker Introduces Sentry 5: The Ultimate Hardware Encrypted USB Flash Drive for Compliance and Security

Read More

Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.


September 15, 2021 | Shauna Park

What is an Encryption Certificate? The National Institute of Standards and Technology, or NIST, defines an encryption certificate as “a certificate containing a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish or exchange a session key for these same purposes. Key management sometimes refers to the process […]

Read more


password encryption

September 15, 2021 | Shauna Park

Are Passwords Encrypted? Passwords are one of the most important security features available today. Creating secure and unguessable passwords is becoming more complex, let alone remembering the many passwords we use daily. Many websites are programmed not to allow easily guessable passwords, but strong passwords aren’t enough to keep cyber thieves away from your information.   […]

Read more


hashing and hash functions

September 15, 2021 | Shauna Park

What Are Cryptographic Hashes? If you’ve found yourself wondering what exactly hashing is, it’s essentially a mathematical algorithm mapping and compressing data. This can be any data – a name, date of birth, a file, or a transaction. The data can be any size during this process, from something as big as 200 megabytes to […]

Read more


AES vs other forms of encryption

September 15, 2021 | Shauna Park

As cyber threats become a daily occurrence, it’s more important than ever to understand the different types of encryption. In past weeks, we’ve covered several topics around encryption, and now we’re going to take a closer look at the various encryption types. Quick Encryption Recap – Encryption is the process of making readable data unreadable […]

Read more


AES Encryption

September 1, 2021 | Shauna Park

Developed in 1998 by Vincent Rijmen and Joan Daemen, two Belgian cryptographers, Advanced Encryption Standard, or AES, has been around for several decades. Originally referred to as Rijndael, AES is symmetric encryption, meaning it uses the same key to encrypt and decrypt data. By using the substitution permutation network algorithm (SPN), it encrypts through multiple […]

Read more


Asymmetric vs Symmetric

September 1, 2021 | Shauna Park

Encryption is critical to protecting sensitive information. A lack of encryption has led to massive data breaches, including a Microsoft customer support database of over 280 million customer records, a 500K breach of Zoom accounts, and much more. In previous articles, we shared the basics of encryption, but you also need to know about the […]

Read more


Encryption

September 1, 2021 | Shauna Park

Many people assume that when information isn’t being transmitted, it’s safe. But to effectively encrypt personally identifiable information, many variables must be considered, including the state the data is in. In order to understand how to encrypt data in various states, we first need to look at the differences between the three states of data: […]

Read more


Encryption, data, security

September 1, 2021 | Shauna Park

Every day, people share information across public wires that travel through a series of third-party databases. Even though it’s an open system, we continue to exchange personally identifiable information like credit card numbers, bank information, passwords, and emails. Between our smartphones, tablets, and other devices, we have data traveling through many connections – so, how […]

Read more


Why does encryption matter to organizations

September 1, 2021 | Shauna Park

Cyberthreats are a troubling daily reality, affecting everyone from small business owners to industry leaders. To make matters worse, people take more significant risks in cyberspace than they do in the physical world. Plus, the risks are harder to understand and they affect our risk vs. reward decision-making abilities. In the physical world, it’s easy […]

Read more


May 29, 2021 | DataLocker Blog

Strong passwords are essential. But outside of writing down passwords, how can you create a password that’s both secure and memorable? What are other ways to get around writing them down? Use a Password Manager Rather than memorize a password…don’t. A password manager will create a long and complicated password automatically. When it’s time to […]

Read more


1