SSDs are increasingly popular for storing data, but they open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Find out how this security problem and other issues created by using an embedded SSD can be eliminated by reading our guide.
Published Technical Articles
In an previous blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are other methods of attack which are harder to thwart. Also, the bigger picture of implementing which is discussed here.
One key focus for the majority of engineers is Security. And these days it’s even more of a danger, with threats increasing in number and sophistication.
If you design embedded systems, and security is at the forefront of your mind, you’ll find our latest blog useful. In it we discuss:
- Exactly how your embedded system might be attacked
- How IIoT can make embedded systems more vulnerable
- The two most common types of embedded system attacks
- Two recent embedded system attacks and what we can learn from them
To ensure your data is completely gone, you need to securely erase your SSD. While this can be done in a variety of ways, traditional third-party services for secure erase come with a series of pain points. this technical blog explores the various solutions for securely wiping sensitive data.
There is a security risk inherent in using removable memory devices such as USB Sticks. The wide availability of USB drives makes them attractive to hackers and an ideal vehicle for introducing malware into a company from within its IT Firewall. Read in our technical blog how moving to industrial removable memory devices could make your environment cyber safe
Powerloss protection (PLP) protects your local system from experiencing data corruption or loss, in turn reducing the risk of corrupted data being stored. To get the full story on PLP and decide whether it could be valuable for you, have a read of our technical blog
Flexxon X-PHY really is incredibly effective against ransomware attacks, as you can see from this video – – but it’s also equally brilliant at counteracting physical threats.
If you’d like a live demonstration contact us and we’ll arrange one for you either live or via zoom.
This paper highlights just a few of the potential applications for Datakey CryptoAuthentication memory tokens. The functionality described in each use case can be combined or removed to fit a particular application. If you start by asking what features and functions are needed we can help you in developing use cases specific to your application.
Pretty much any embedded system you can think of will utilise some form of removable technology and the options available to the designer have increased – you’re able to choose from a variety of USB flash drives and SD card solutions. Many of these are ‘standard’ and ‘universal’, while others are “non-standard”, abandoning the standard form factors for reasons of robustness or security.
To help you build something that performs its function AND stands the test of time, we’ve put this guide together – to make the process as easy as possible for you.
This white paper gives an introduction to the topic of wireless coexistence of medical devices, including what the FDA has to say about it. It then takes an in-depth look on how to manage multiple instances of the same wireless medical
device in the same proximity. Several options are discussed for linking or pairing of these wireless medical devices