In a very real experiment in 2016, cyber security researchers spread 297 USB drives randomly around the Urbana-Champaign campus at the University of Illinois.
Half were picked up and plugged in, but only a tiny 16% of that half were scanned for viruses. Not difficult for that Trojan to spread itself around.
Sadly, cyber security is a huge threat, and massively so to SMEs in 2020.
That’s because SMEs are the ones who are least likely to have cyber security professionals on their payroll or to be subscribing to managed cyber protection services.
But what people don’t know is that there’s a simple solution to negate the risk in Embedded Systems.
Datakey’s new CryptoAuthentication™ tokens – now available in the UK, Ireland, Germany, Austria, Switzerland and Scandinavia from Nexus Industrial Memory – are ideal for embedded systems that:
- Require ‘cyber robust’ removable memory devices for applications that include the transfer of passwords (or other data needed for user authentication purposes)
- Need physical transfer of security keys, certificates, sensitive data or system configuration files.
At the heart of all devices in the CryptoAuthentication line of memory tokens is a Microchip CryptoAuthentication high-security hardware IC.
Its features include a unique and non-changeable 72-bit serial number (set by Microchip), 512bit one-time programmable (OTP) zone, a random number generator, and a SHA-256 hash algorithm for data encryption.
Datakey CryptoAuthentication tokens combine form and function; silicon geared for high security applications with a unique form factor that brings physical security and the ability to be used in harsh environments.
If you have a system that needs to interface with removable memory devices, you can greatly reduce the risk of a virus being introduced by avoiding a form factor as widely available as USB thumb drives. Want to see the unique form factor that we are talking about for real? Then CLICK HERE to request a FREE SAMPLE TOKEN and we’ll send you a copy of our informative blog as well.
If you want to reduce the risk of cloning, detect tampering and thwart cyber attacks, then please get in touch.