Download this next:

7 NAS encryption best practices to protect data

In the hybrid work era, finding efficient ways to protect an enterprise's data is mission-critical. Encryption is one of the most effective tools to protect data on network-attached storage. Even if cybercriminals gain access to the drives or intercept communications to or from them, encryption makes the data unreadable to anyone who does not have the cryptographic key.

NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk.

Here are seven NAS encryption best practices to protect your data.

These are also closely related to: "TrueCrypt"

  • 2 types of endpoint encryption to protect data

    Encryption is the key layer in any data security strategy as it ensures data cannot be read by unauthorized users. Even if multiple layers of protection fail or are breached, encrypted data stays protected.

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • A Security Assessment of Android Full-disk Encryption

    Lost or stolen smartphones need protection. Full-disk encryption has become a popular method of protecting data stored on a smartphone against such events. In this article we introduce two attacks on full-disk encryption for Android. The first targets older pre-Android 5.0 versions. This attack is well known and exploitation tools are publicly available. Android 5.0 claims to have resolved the previous attack. We describe a new attack on Android 5.0, which does not take significantly longer to conduct than the pre-Android 5.0 exploit. We also discuss potential countermeasures, observing that simple solutions are hard to find.

Find more content like what you just read:

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

    Download

  • Tokenization: Evaluating data-centric protection solutions

    Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.

    Download

  • eGuide: Expert Tips for Deploying Secure Messaging Technologies

    This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.

    Download

  • Mobile Device Security Best Practices for BYOD

    This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.

    Download

  • Royal Holloway: An enhanced approach for USB security management

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

    Download

  • Expert Guide to Securing Emerging Endpoints

    Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.

    Download

  • Data privacy under the GDPR, machine learning, and more

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Six Email Security Best Practices for Email SaaS

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

    Download

  • Top Mobile Data Protection Best Practices

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

    Download

  • Executive Interview: Unleashing blockchain's potential

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

    Download

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • Best Practices for Mobile Data Protection

    This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.

    Download

  • Mobile data protection best practices

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

    Download

  • SSL Certificate Management: Common Mistakes and How to Avoid Them

    Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • Exploring cloud Security as a Service options

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

    Download

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

    Download

  • Building the Right Mobile Security Toolkit

    Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.

    Download

  • Securing Corporate Data in the Age of Mobile Computing

    This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.

    Download

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!

    This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.

    Download

  • Compliance and Cloud Security eBook

    SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.

    Download

  • Targeted cyber attacks in the UK and Europe

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

    Download

  • Expert ways to maximize security in Exchange

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.

    Download

  • Challenges With Data Protection in the Cloud

    This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.

    Download

  • Your GDPR guide

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Download

  • Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

    Download

  • Best Practices for Mobile Device Management

    This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

    Download

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.

    Download

  • Fintech & the digital customer experience

    In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.

    Download

  • Securing the enterprise application layer: Expert Guidelines

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.

    Download

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?

    With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.

    Download

  • CW Europe – December 2018

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

    Download

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

    Download

  • The Investigatory Powers Act 2016 and Internet Connections Records

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

    Download

  • Data quality emerges from Covid-19 more critical than ever

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

    Download

  • Data quality emerges from Covid-19 more critical than ever

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

    Download

  • Enterprise Mobile Device Security Best Practices

    This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.

    Download

  • BYOPC Strategy: Policies and Problem Solving

    Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.

    Download

  • Defining Your Corporate Mobile Policies

    It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • How SSL-Encrypted Web Connections are Intercepted

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

    Download

  • Data protection in the age of Brexit and GDPR

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download