hardware’s role in a robust data protection strategy...in a robust data protection strategy...

1
Hardware’s Role in a Robust Data Protection Strategy Security hardware is essential in a multilayered defense against data breaches. Anything from an unsecured laptop to a stray piece of paper can precipitate a costly breach. Kensington hardware security solutions can strengthen your data protection strategy at multiple junctures. Over 80% of all breaches involve lost or stolen credentials. 1 Implementing 2FA with a VeriMark TM Fingerprint Key eliminates this risk by requiring a unique biometric credential. Fingerprint Keys Visual hacking succeeds 9 times out of 10. 2 But a privacy screen can reliably narrow viewing angles on laptops, monitors, and tablets, making it harder for onlookers to steal on-screen data. Privacy Screens 61% of businesses have experienced device loss or theft, which can result in data exfiltration. 3 Laptop locks lower this risk by securing devices in place. Laptop Locks The typical office worker uses 10,000 sheets of paper yearly. 4 Commercial paper shredders ensure that any confidential info is rendered unrecoverable. Paper Shredders The best office security strategies are multifaceted. Kensington has your organization covered with solutions in all of these categories and others. Learn more at www.kensington.com Sources 1 https://enterprise.verizon.com/resources/reports/dbir/ 2 multimedia.3m.com/mws/media/1254232O/global-visual-hacking-experiment-study-summary.pdf 3 www.kensington.com/siteassets/documents/kensington-lockingWP-277450-june2018-FINAL.pdf 4 www.recordnations.com/2016/02/how-much-paper-is-used-in-one-day/ Products may not be available in all markets. Kensington, VeriMark, and The Professionals’ Choice are registered trademarks of ACCO Brands. © 2019 Kensington Computer Products Group, a division of ACCO Brands. All rights reserved.K19_3595

Upload: others

Post on 11-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hardware’s Role in a Robust Data Protection Strategy...in a Robust Data Protection Strategy Security hardware is essential in a multilayered defense against data breaches. Anything

Hardware’s Role in a Robust Data Protection Strategy

Security hardware is essential in a multilayered defense

against data breaches. Anything from an unsecured laptop

to a stray piece of paper can precipitate a costly breach.

Kensington hardware security solutions can strengthen

your data protection strategy at multiple junctures.

Over 80%of all breaches involve lost or stolen credentials.1

Implementing 2FA with a

VeriMarkTM Fingerprint Key

eliminates this risk by

requiring a unique

biometric credential.

Fingerprint Keys

Visual hacking succeeds

9 times out of 10.2

But a privacy screen can

reliably narrow viewing

angles on laptops,

monitors, and tablets,

making it harder for

onlookers to steal

on-screen data.

Privacy Screens

61% of businesses have experienced device loss or theft, which can result in data exfiltration.3

Laptop locks lower this risk

by securing devices in place.

Laptop Locks

The typical office worker

uses 10,000 sheets of paper yearly.4

Commercial paper

shredders ensure that

any confidential info is

rendered unrecoverable.

Paper Shredders

The best office security strategies are multifaceted. Kensington has your

organization covered with solutions in all of these categories and others.

Learn more at www.kensington.com

Sources1 https://enterprise.verizon.com/resources/reports/dbir/

2 multimedia.3m.com/mws/media/1254232O/global-visual-hacking-experiment-study-summary.pdf

3 www.kensington.com/siteassets/documents/kensington-lockingWP-277450-june2018-FINAL.pdf

4 www.recordnations.com/2016/02/how-much-paper-is-used-in-one-day/

Products may not be available in all markets. Kensington, VeriMark, and The Professionals’ Choice are registered trademarks of ACCO Brands.

© 2019 Kensington Computer Products Group, a division of ACCO Brands. All rights reserved.K19_3595