<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IronKey.net.nz &#187; privacy</title>
	<atom:link href="https://www.ironkey.net.nz/category/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ironkey.net.nz</link>
	<description>Buy Online – IronKey</description>
	<lastBuildDate>Sun, 23 Jun 2019 06:15:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.2</generator>
	<item>
		<title>IronKey &#8211; used by a disaster-preparedness company for secure storage</title>
		<link>https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/</link>
		<comments>https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/#comments</comments>
		<pubDate>Tue, 26 Apr 2011 00:40:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=142</guid>
		<description><![CDATA[<p>Black Umbrella, a disaster-preparedness company use IronKey for critical document storage and organization. President of Black Umbrella, Catherine Hooper says: &#8220;We scan, store and digitize people&#8217;s critical documents, wills, trusts, powers of attorney, insurance documents. We put them on a special, secure thumb drive called an IronKey. &#8220; Whilst only a small part of what [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/">IronKey &#8211; used by a disaster-preparedness company for secure storage</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Black Umbrella, a disaster-preparedness company use IronKey for critical document storage and organization.</p>
<p>President of Black Umbrella, Catherine Hooper says:</p>
<p><em>&#8220;We scan, store and digitize people&#8217;s critical documents, wills, trusts, powers of attorney, insurance documents. We put them on a special, secure thumb drive called an IronKey. &#8220;</em></p>
<p>Whilst only a small part of what people cope with in a disaster, you can have peace of mind knowing your IronKey will safely store your secure documents.</p>
<p>You can read the full interview with Catherine Hooper over at <a href="http://today.msnbc.msn.com/id/42442832/ns/today-money/">MSNbc</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/">IronKey &#8211; used by a disaster-preparedness company for secure storage</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Great technical review of the IronKey Personal D200</title>
		<link>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/</link>
		<comments>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/#comments</comments>
		<pubDate>Wed, 13 Apr 2011 01:45:18 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[D250]]></category>
		<category><![CDATA[ironkey personal]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[IronKey D200 Personal]]></category>
		<category><![CDATA[secure browsing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=135</guid>
		<description><![CDATA[<p>Top Ten Reviews provides a technical and in-depth review of the IronKey Personal D200, a must-read for the techies among you. Key points: The encryption is hardware-based 256-bit AES validated by the National Institute of Standards and Technology  to meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/">Great technical review of the IronKey Personal D200</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Top Ten Reviews provides a technical and in-depth review of the <strong><a href="http://www.ironkey.net.nz/products-page/ironkey-personal/d2001/" target="_blank">IronKey Personal D200</a></strong>, a must-read for the techies among you.</p>
<p>Key points:</p>
<ul>
<li>The encryption is <strong>hardware-based 256-bit  AES</strong> validated by the National Institute of Standards and Technology  to  meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by the U.S. government.</li>
<li>The <strong>IronKey</strong> goes the extra mile past the 256-bit encryption standard by using the FIPS 140-2 Level Three  criteria that make it  difficult to physically  tamper with the IronKey, including features such its rugged  metal casing and sealed internal components.</li>
<li>The system is safe from <strong>malware</strong> or cold-boot attacks because the drive  does not export AES encryption keys to the host PC. If anyone tries a  brute-force attack based on password guesses, after 10 incorrect  passwords all encrypted data is erased.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/">Great technical review of the IronKey Personal D200</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacking attacks: how to protect yourself</title>
		<link>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/</link>
		<comments>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/#comments</comments>
		<pubDate>Fri, 08 Apr 2011 04:50:34 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[privacy]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=132</guid>
		<description><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm Epsilon was the target of a specific attack, allowing customers&#8217; confidential data to be exposed. The theft of the confidential information (in this case, email addresses) can enable hackers to use phishing to trick the customer into revealing further confidential information.  In this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm <strong>Epsilon</strong> was the target of a specific attack, allowing customers&#8217; confidential data to be exposed.</p>
<p>The theft of the confidential information (in this case, email addresses) can enable hackers to use <strong>phishing</strong> to trick the customer into revealing further confidential information.  In this case, this data could reveal where the customers, then the hacker could sucessfully direct the customer to a a website which looks like a legitimate banking site, but in truth, is not.</p>
<p>Practical steps you can take include checking new emails addresses against previous emails from the bank, warning family members (especially younger ones) about the dangers, and checking links in emails before you click on them.</p>
<p>View the full article <a href="http://www.kidglue.com/2011/04/07/how-does-the-epsilon-hacker-attack-affect-your-family/" target="_blank">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey password backup</title>
		<link>https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/</link>
		<comments>https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/#comments</comments>
		<pubDate>Fri, 21 Jan 2011 01:26:28 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[ironkey personal]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[IronKey]]></category>
		<category><![CDATA[password]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=61</guid>
		<description><![CDATA[<p>A key feature of IronKey&#8217;s security means that incorrect password attempts over 10, results in the hardware encryption chip self destructing. Here are some handy hints to ensure that you aren&#8217;t the cause of your own IronKey self destructing: store the password in your personal account on my.ironkey.com securely backup your IronKey files on your [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/">IronKey password backup</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>A key feature of <strong>IronKey&#8217;s security</strong> means that <strong>incorrect password attempts</strong> over 10, results in the hardware encryption chip self destructing.</p>
<p>Here are some handy hints to ensure that you aren&#8217;t the cause of your own IronKey self destructing:</p>
<ul>
<li>store the password in your personal account on my.ironkey.com</li>
<li>securely backup your IronKey files on your PC, note though that if you lose your IronKey, you need to have another IronKey in order to access this data.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/">IronKey password backup</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How does IronKey&#8217;s Secure Web Browsing work?</title>
		<link>https://www.ironkey.net.nz/2010/12/10/how-does-ironkeys-secure-web-browsing-work/</link>
		<comments>https://www.ironkey.net.nz/2010/12/10/how-does-ironkeys-secure-web-browsing-work/#comments</comments>
		<pubDate>Fri, 10 Dec 2010 03:07:02 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[IP address]]></category>
		<category><![CDATA[ironkey]]></category>
		<category><![CDATA[paypal]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[secure session service]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[data secure]]></category>
		<category><![CDATA[Mozilla Firefox]]></category>
		<category><![CDATA[secure web browsing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=24</guid>
		<description><![CDATA[<p>Many users ask us about secure web browsing on the Ironkey.  This is enabled through the built-in FireFox browser, activated by plugging the IronKey into a computer, clicking the Mozilla Firefox icon in the control panel, which opens a secure internet connection and connects to the web using the Secure Session Service. The Secure Session [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/10/how-does-ironkeys-secure-web-browsing-work/">How does IronKey&#8217;s Secure Web Browsing work?</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Many users ask us about secure web browsing on the <a href="http://ironkey.net.nz">Ironkey</a>.  This is enabled through the built-in <strong>FireFox browser</strong>, activated by plugging the IronKey into a computer, clicking the Mozilla Firefox icon in the control panel, which opens a secure internet connection and connects to the web using the <strong>Secure Session Service</strong>.</p>
<p>The Secure Session Service uses an online router called &#8216;Tor&#8217; to allow the user to browse fast and securely online.</p>
<p>What does it secure? Valuable and confidential information such as IP address, your banking passwords and pin numbers, or auto-login information for payment sites such as <strong>Paypal</strong>.  This information cannot be traced by hackers as it is not stored on the computer.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/10/how-does-ironkeys-secure-web-browsing-work/">How does IronKey&#8217;s Secure Web Browsing work?</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2010/12/10/how-does-ironkeys-secure-web-browsing-work/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Wikileaks Privacy Lesson</title>
		<link>https://www.ironkey.net.nz/2010/12/03/the-wikileaks-privacy-lesson/</link>
		<comments>https://www.ironkey.net.nz/2010/12/03/the-wikileaks-privacy-lesson/#comments</comments>
		<pubDate>Fri, 03 Dec 2010 01:10:03 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Wikileaks]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[world secrets]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=21</guid>
		<description><![CDATA[<p>So the arrest warrants for Wikileaks founder Julian Assange may or may not be valid, but have we not been taught a valuable lesson about the importance of privacy? Some of the secrets revealed show Americans and the world the depth of thought that has gone on in some of the key world players.  Who [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/03/the-wikileaks-privacy-lesson/">The Wikileaks Privacy Lesson</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the arrest warrants for <strong>Wikileaks </strong>founder <strong>Julian Assange</strong> may or may not be valid, but have we not been taught a valuable lesson about the importance of privacy?</p>
<p>Some of the <a href="http://www.economist.com/node/17632855">secrets revealed</a> show Americans and the world the depth of thought that has gone on in some of the key world players.  Who knew how many countries keep nuclear weapons around the world, that other countries are urging American that an American attack on Iran is &#8220;necessary&#8221;, and many more&#8230;..</p>
<p>Whilst it is scintillating to hear <strong>world secrets exposed</strong>, it broaches the wider question of how this information was leaked (from the US State Department), and how it could better have been protected.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/03/the-wikileaks-privacy-lesson/">The Wikileaks Privacy Lesson</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2010/12/03/the-wikileaks-privacy-lesson/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
