Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

We are often asked for our advice regarding securing information on a USB flash drive. Our first response to this is that USB flash drives should NOT be used to store, exchange or transport sensitive information unless there is no other option. If you have no other option, then below are our recommendations for how to ensure your data remains protected. The first two options that utilize a keypad built-in to the USB device are the most secure and most versatile, but also the most expensive.

 

Info
titleIMPORTANT!

You should never rely on a USB flash drive as your sole data source. ALWAYS have a copy of your data stored securely in another location. In addition to being easily lost or stolen, USB flash drives can a do fail. Often they can be working fine one minute and the next they are completely inaccessible and your data is lost.

USB DevicePros / FeaturesCons

Apricorn Aegis Secure KeyImage Modified

  • Works in any system that reads USB drives
  • No software needs to be installed on the host system
  • FIPS 140-2 Level 3 certified
  • Auto-lock secures your data as soon as the drive is removed from the computer
  • Auto self-destruct deletes all data if incorrect PIN is entered 10 consecutive times
  • Expensive

Kingtson DataTraveler 2000

Image Modified
  • Works in any system that reads USB drives
  • No software needs to be installed on the host system
  • FIPS 197 certified
  • Auto-lock secures your data as soon as the drive is removed from the computer
  • Auto self-destruct deletes all data if incorrect PIN is entered 10 consecutive times
  • Expensive

Kingston DataTraveler Vault Privacy

Image Modified
  • Works with Windows 7 and higher, Mac OS X 10.9 and higher, Linux v2.6.x
  • FIPS 197 certified
  • Moderately expensive
  • Must run software on the host to unlock the drive

BitLocker Encryption of any standard USB flash driveImage Modified

  • Very cheap
  • While not FIPS compliant, still fairly secure and sufficient for most data that does not contain PII or PHI
  • Only compatible with Windows-based machines
  • Not FIPS compliant by default and not easy to enable
  • NOT acceptable for PII or PHI data