Data Security - Kingston Knowledge Centre
Read helpful articles by Kingston’s experts on data security and encryption for portable devices out in the field, as well as security best practices and advice in the enterprise and data centre environment.

-
Why are USB drives still relevant today?
In this eBook, we explore how Encrypted USB drives have become a key tool in keeping data secure.
-
Setting Up Kingston IronKey™ Vault Privacy 80 External SSD
How to use your IronKey Vault Privacy 80 External SSD: set password, connecting to a PC and more.
-
Protect Private Mobile Data in Healthcare
Organisations are considering data security options to protect against private mobile data breaches.
-
Finance industry: Keeping sensitive data safe with Kingston IronKey
Discover how Kingston IronKey is protecting the sensitive data of the finance sector.
-
Protecting critical data in the energy sector with Kingston IronKey encrypted drives
Here is how Kingston IronKey helped protect the sensitive data of the Energy industry.
-
Cybersecurity – How to stay ahead in 2022
We explore our KingstonCognate experts’ thoughts on cyberthreats and cybersecurity challenges.
-
Transporting and protecting data outside your firewall
Protecting data on the move with superior hardware-based Advanced Encryption Standard (AES) 256.
-
Software encryption and regulatory compliance: Less expensive solution with major security risks
Users can disable software-based encryption, which can lead to legal fees if the drive is lost.
-
How to stay secure in a digitised world
We explore Tomasz Surdyk's thoughts on how all entities can stay secure in the digitised world.
-
FBI warns that hackers are mailing malware on USB drives to their targets
Don’t plug any USB drives into your computer if you don’t know exactly where they came from.
-
What businesses need in their work-from-home enablement
What we learned from Kingston’s experts and tech influencers on work-from-home enablement Twitter chat.
-
Is encrypted storage needed if you use the cloud?
There are benefits to using both cloud storage and hardware-based encryption.