Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form
Image of padlock against computer code

Is this the most secure portable hard drive ever made?

Posted on April 19, 2017April 19, 2017 By Davey Winder

The first UK journalist to get hold of an iStorage diskAshur PRO 2 drive, I’ve been taking a close look…

I am, I will readily admit, something of a fan of iStorage secure drives. File me under paranoid perhaps, but as someone who has worked in and around the IT security industry for the last 25 years I kind of like my data to be as secure as possible. Yet data in transit, that is any data that resides on a portable drive of any description, is always going to be at a higher risk of exposure than I’d like.

This is why I’ve always recommended that such data should be encrypted, but that much is a given right? Well, yes, but then there’s how you encrypt it? Software encryption comes with caveats, so I prefer to ensure my portable data is on a hardware encrypted device. That’s why I run with, well walk quickly at my age at best, datashure Pro USB 3.0 hardware encrypted thumb drive. Gotta love the hardware encryption, gotta love the on-drive keypad for PIN entry etc

This is all well and good, but what if you need something more, something bigger? Most portable hard drives (as opposed to flash drives) do not come with the same kind of protection. The diskAshur range has always been an exception to the rule, and indeed that’s probably why I have an original diskAshur PRO device in my kitbag. Well, had, to be precise. It has now been replaced, well and truly, by the mark 2 upgrade. Whereas the original was just secure, the new model is batshit crazy secure. And then some.

Click here to read complete article

Encryption Tags:Data, Encryption, HDD, portable

Post navigation

Previous Post: Can we encrypt the web while giving governments a backdoor to snoop?
Next Post: How AI is driving the future of regulatory compliance in the financial sector

Related Articles

Ingenious Hackers Used iPhone 13 To Steal Samsung Galaxy Crypto Key—Here’s How To Stop Them Analysis
LastPass Password Vaults Stolen By Hackers—Change Your Master Password Now Breach
New Gmail Encrypted Email Feature Confirmed By Google, Will You Get It? Announcements
Is Elon Musk Bringing Encrypted Messages To The $8 Twitter Blue Party? Analysis
Microsoft Tells Windows 10 BitLocker Users: Turn It Off And On Again Encryption
word cloud of crypto terms Quantum-powered random numbers could provide key to better cryptography Encryption

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government Hackers Hacking Health healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Twitter Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2025 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy