hardware’s role in a robust data protection strategy...in a robust data protection strategy...
TRANSCRIPT
Hardware’s Role in a Robust Data Protection Strategy
Security hardware is essential in a multilayered defense
against data breaches. Anything from an unsecured laptop
to a stray piece of paper can precipitate a costly breach.
Kensington hardware security solutions can strengthen
your data protection strategy at multiple junctures.
Over 80%of all breaches involve lost or stolen credentials.1
Implementing 2FA with a
VeriMarkTM Fingerprint Key
eliminates this risk by
requiring a unique
biometric credential.
Fingerprint Keys
Visual hacking succeeds
9 times out of 10.2
But a privacy screen can
reliably narrow viewing
angles on laptops,
monitors, and tablets,
making it harder for
onlookers to steal
on-screen data.
Privacy Screens
61% of businesses have experienced device loss or theft, which can result in data exfiltration.3
Laptop locks lower this risk
by securing devices in place.
Laptop Locks
The typical office worker
uses 10,000 sheets of paper yearly.4
Commercial paper
shredders ensure that
any confidential info is
rendered unrecoverable.
Paper Shredders
The best office security strategies are multifaceted. Kensington has your
organization covered with solutions in all of these categories and others.
Learn more at www.kensington.com
Sources1 https://enterprise.verizon.com/resources/reports/dbir/
2 multimedia.3m.com/mws/media/1254232O/global-visual-hacking-experiment-study-summary.pdf
3 www.kensington.com/siteassets/documents/kensington-lockingWP-277450-june2018-FINAL.pdf
4 www.recordnations.com/2016/02/how-much-paper-is-used-in-one-day/
Products may not be available in all markets. Kensington, VeriMark, and The Professionals’ Choice are registered trademarks of ACCO Brands.
© 2019 Kensington Computer Products Group, a division of ACCO Brands. All rights reserved.K19_3595