Your Data Amongst the Shopping Frenzy

A lot of last minute shopping is taking place as you get ready for holiday gift giving. This creates a huge amount of IT processes, storage and data security activity for many organizations including wholesalers, retailers and financial institutions. In this BlogBytes, we will review a mishap that occurred at one financial institution and the procedures that businesses involved in the shopping frenzy can take to protect sensitive information with use of LTO technology and its data security features.

Remember that protection of sensitive information begins with you. As discussed in a previous BlogBytes article, if you receive emails or social media with suspicious attachments or links, that beg you to click on them, be wary, especially during this hectic time of year! Throughout the holiday season, malware infection attempts run rampant, but you can prevent them from affecting your data. The e-mail and links may look legitimate, but you and your employees should avoid clicking suspicious links and attachments. Instead, seek advice directly from your IT security team and the official website the email might be imitating.

Data Goes Missing!

Businesses face the task of not only protecting data from malware attacks, but they also must protect the physical location and transport of data. As reported in a Reuter’s article, a bank in Malaysia had backup tapes that went missing!  It was stated that the tapes did not contain any authentication data, such as pin numbers, passwords or credit card security numbers, and that it has heightened security measures following the loss of the tapes. In addition to the potential of tapes going missing, data is vulnerable on laptops, hand held devices, removable drives, USB flash drives and more. What should you do?

What data security measure can be employed?

Protecting data not only means securing it in your facility from cyber-attacks or mishandling it, but also when the data is in transit via communication lines or when physically transported by truck or mail.  Sensitive data should be encrypted on all devices. LTO technology offers outstanding protection of data at rest or in physical transit by supporting high-level data encryption. Let’s take a closer look at LTO technology’s data encryption functionality.

A Look at LTO Tape Data Encryption

Securing sensitive data can be done at a fraction of the costs of negative publicity, security breach notification, fines, mandated security measures or civil litigation. As noted in the Securing Sensitive Information whitepaper, with LTO tape data encryption, the stored data is encrypted when it is written and decrypted when an authenticated user reads it. This type of encryption is permanent and protects data where it is stored.  If the tape gets in to the wrong hands it cannot be read!

Support for data encryption began with LTO generation-4 with a 256-bit symmetric key AES-GCM algorithm implemented in tape drive hardware. With this, there is virtually no tape performance penalty and it fully supports the IEEE standard (P1619.1) for tape based encryption and the SCSI encryption augmented (T10) command set. The LTO tape drive first compresses user data and then encrypts it. Thus, the drive can maximize the tape cartridge data capacity while addressing data security concerns. Additionally, encrypted data can be added or appended to an LTO encrypted tape cartridge, allowing the cartridge capacity to be fully utilized.

Safeguard your data at rest and in transit during this festive, but chaotic, season and all year long with LTO tape data encryption. Implementing LTO encryption is a simple, straightforward process that is well worth the effort. Learn more about LTO data encryption here.