<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IronKey.net.nz &#187; security</title>
	<atom:link href="https://www.ironkey.net.nz/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ironkey.net.nz</link>
	<description>Buy Online – IronKey</description>
	<lastBuildDate>Sun, 23 Jun 2019 06:15:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.2</generator>
	<item>
		<title>IronKey recommends banks use Twitter to alert customers of scams</title>
		<link>https://www.ironkey.net.nz/2011/05/30/ironkey-recommends-banks-for-use-twitter-to-alert-customers-of-scams/</link>
		<comments>https://www.ironkey.net.nz/2011/05/30/ironkey-recommends-banks-for-use-twitter-to-alert-customers-of-scams/#comments</comments>
		<pubDate>Mon, 30 May 2011 03:13:13 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[online scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[twitter]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=175</guid>
		<description><![CDATA[<p>Last week IronKey announced a few simple steps banks can take to help prevent customers falling for e-mail scams. What IronKey recommend, Create and verify a Twitter account. Advertise it so people know about it! Use it to promptly let customers know about scams, as well as other helpful security advice. Dave Jevans, of IronKey [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/05/30/ironkey-recommends-banks-for-use-twitter-to-alert-customers-of-scams/">IronKey recommends banks use Twitter to alert customers of scams</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Last week<strong> IronKey</strong> announced a few simple steps <strong>banks</strong> can take to help prevent customers falling for e-mail scams.</p>
<p>What IronKey recommend,</p>
<ol>
<li>Create and verify a <strong>Twitter </strong>account.</li>
<li>Advertise it so people know about it!</li>
<li>Use it to promptly let customers know about scams, as well as other helpful security advice.</li>
</ol>
<p>Dave Jevans, of IronKey said</p>
<p>&#8220;By using <strong>Twitter</strong> to publicise Internet security threats, banks can warn  customers instantaneously, without sending them e-mails which could  themselves be construed as malicious phishing attempts.&#8221;</p>
<p>You can read more over at <a href="http://www.finextra.com/news/fullstory.aspx?newsitemid=22593" target="_blank">finextra.com</a></p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/05/30/ironkey-recommends-banks-for-use-twitter-to-alert-customers-of-scams/">IronKey recommends banks use Twitter to alert customers of scams</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/05/30/ironkey-recommends-banks-for-use-twitter-to-alert-customers-of-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey and Ceedo Secure Virtual Desktop Applications</title>
		<link>https://www.ironkey.net.nz/2011/04/26/ironkey-and-ceedo-secure-virtual-desktop-applications/</link>
		<comments>https://www.ironkey.net.nz/2011/04/26/ironkey-and-ceedo-secure-virtual-desktop-applications/#comments</comments>
		<pubDate>Tue, 26 Apr 2011 01:23:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=147</guid>
		<description><![CDATA[<p>IronKey and Ceedo have jointly launched a secure workspace visualisation solution, designed for mobile enterprises. The solution from IronKey and Ceedo isolates the user&#8217;s workspace, taking all their data &#38; applications from their work PC, and stores it on a portable IronKey device. You can read more at marketwire.com</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/26/ironkey-and-ceedo-secure-virtual-desktop-applications/">IronKey and Ceedo Secure Virtual Desktop Applications</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>IronKey and Ceedo have jointly launched a secure workspace visualisation solution, designed for mobile enterprises.</p>
<p>The solution from IronKey and Ceedo isolates the user&#8217;s workspace, taking all their data &amp; applications from their work PC, and stores it on a portable IronKey device.</p>
<p>You can read more at <a href="http://www.marketwire.com/press-release/ironkey-and-ceedo-secure-virtual-desktop-applications-1504517.htm">marketwire.com</a></p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/26/ironkey-and-ceedo-secure-virtual-desktop-applications/">IronKey and Ceedo Secure Virtual Desktop Applications</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/26/ironkey-and-ceedo-secure-virtual-desktop-applications/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey &#8211; used by a disaster-preparedness company for secure storage</title>
		<link>https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/</link>
		<comments>https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/#comments</comments>
		<pubDate>Tue, 26 Apr 2011 00:40:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=142</guid>
		<description><![CDATA[<p>Black Umbrella, a disaster-preparedness company use IronKey for critical document storage and organization. President of Black Umbrella, Catherine Hooper says: &#8220;We scan, store and digitize people&#8217;s critical documents, wills, trusts, powers of attorney, insurance documents. We put them on a special, secure thumb drive called an IronKey. &#8220; Whilst only a small part of what [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/">IronKey &#8211; used by a disaster-preparedness company for secure storage</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Black Umbrella, a disaster-preparedness company use IronKey for critical document storage and organization.</p>
<p>President of Black Umbrella, Catherine Hooper says:</p>
<p><em>&#8220;We scan, store and digitize people&#8217;s critical documents, wills, trusts, powers of attorney, insurance documents. We put them on a special, secure thumb drive called an IronKey. &#8220;</em></p>
<p>Whilst only a small part of what people cope with in a disaster, you can have peace of mind knowing your IronKey will safely store your secure documents.</p>
<p>You can read the full interview with Catherine Hooper over at <a href="http://today.msnbc.msn.com/id/42442832/ns/today-money/">MSNbc</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/">IronKey &#8211; used by a disaster-preparedness company for secure storage</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/26/ironkey-used-by-a-disaster-preparedness-company-for-secure-storage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacking attacks: how to protect yourself</title>
		<link>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/</link>
		<comments>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/#comments</comments>
		<pubDate>Fri, 08 Apr 2011 04:50:34 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[privacy]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=132</guid>
		<description><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm Epsilon was the target of a specific attack, allowing customers&#8217; confidential data to be exposed. The theft of the confidential information (in this case, email addresses) can enable hackers to use phishing to trick the customer into revealing further confidential information.  In this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm <strong>Epsilon</strong> was the target of a specific attack, allowing customers&#8217; confidential data to be exposed.</p>
<p>The theft of the confidential information (in this case, email addresses) can enable hackers to use <strong>phishing</strong> to trick the customer into revealing further confidential information.  In this case, this data could reveal where the customers, then the hacker could sucessfully direct the customer to a a website which looks like a legitimate banking site, but in truth, is not.</p>
<p>Practical steps you can take include checking new emails addresses against previous emails from the bank, warning family members (especially younger ones) about the dangers, and checking links in emails before you click on them.</p>
<p>View the full article <a href="http://www.kidglue.com/2011/04/07/how-does-the-epsilon-hacker-attack-affect-your-family/" target="_blank">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New IronKey Certification with RDA SecurID Software</title>
		<link>https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/</link>
		<comments>https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/#comments</comments>
		<pubDate>Fri, 11 Feb 2011 01:47:49 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[RSA SecurID]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[IronKey]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=101</guid>
		<description><![CDATA[<p>IronKey has announced that its Trusted Access for Banking and IronKey Enterprise have achieved updated certified interoperability with RSA SecureID 4.1, software from RSA (the security division of EMC).  This certification allows the IronKey to utilise the RSA SecurID platform with financial malware protection and mobile data encryption solutions. What is the RSA Secured Partner [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/">New IronKey Certification with RDA SecurID Software</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>IronKey has announced that its <strong>Trusted Access for Banking</strong> and <a href="http://www.ironkey.net.au/index.php?cPath=249"><strong>IronKey Enterprise</strong></a> have achieved updated certified interoperability with <strong>RSA SecureID 4.1</strong>, software from RSA (the security division of EMC).  This certification allows the IronKey to utilise the RSA SecurID platform with financial malware protection and mobile data encryption solutions.</p>
<p>What is the <strong>RSA Secured Partner Programme</strong>? A technology alliance of over 1,000 security partners, combining their knowledge and resources in order to develop and maintain the highest level of information security solutions.</p>
<p>Further detail on the Marketwire report is available <a href="http://www.marketwire.com/press-release/IronKey-Achieves-New-Certification-With-RSA-SecurID-Software-Client-NYSE-EMC-1394010.htm">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/">New IronKey Certification with RDA SecurID Software</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New cybercrime targets for 2011</title>
		<link>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/</link>
		<comments>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/#comments</comments>
		<pubDate>Fri, 04 Feb 2011 02:39:24 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[paypal]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[PC World]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=98</guid>
		<description><![CDATA[<p>PC World reports that the enterprise, rather than the consumer, will be the predicted cybercrime target for 2010. &#8220;As the new decade opens, cybercrime is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting consumer desktops to employees in the enterprise,&#8221; states the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/">New cybercrime targets for 2011</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.pcworld.com/article/217716/new_year_new_targets_in_cybercrime.html">PC World reports</a> that the <strong>enterprise</strong>, rather than the consumer, will be the predicted cybercrime target for 2010.</p>
<p>&#8220;As the new decade opens, <strong>cybercrime</strong> is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting <strong>consumer desktops</strong> to employees in the enterprise,&#8221; states the 2011 Cybercrime Trends Report.</p>
<p>What does this mean exactly? The volume of <strong>mobile downloads</strong> is expected to rise in 2011 to 25 billion applications, creating more of an opportunity for mobile devices, used by employees of major organisations with access to huge amounts of confidential data, could mean an easy back door for malware to reach into corporate enterprises.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/">New cybercrime targets for 2011</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey password backup</title>
		<link>https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/</link>
		<comments>https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/#comments</comments>
		<pubDate>Fri, 21 Jan 2011 01:26:28 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[ironkey personal]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[IronKey]]></category>
		<category><![CDATA[password]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=61</guid>
		<description><![CDATA[<p>A key feature of IronKey&#8217;s security means that incorrect password attempts over 10, results in the hardware encryption chip self destructing. Here are some handy hints to ensure that you aren&#8217;t the cause of your own IronKey self destructing: store the password in your personal account on my.ironkey.com securely backup your IronKey files on your [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/">IronKey password backup</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>A key feature of <strong>IronKey&#8217;s security</strong> means that <strong>incorrect password attempts</strong> over 10, results in the hardware encryption chip self destructing.</p>
<p>Here are some handy hints to ensure that you aren&#8217;t the cause of your own IronKey self destructing:</p>
<ul>
<li>store the password in your personal account on my.ironkey.com</li>
<li>securely backup your IronKey files on your PC, note though that if you lose your IronKey, you need to have another IronKey in order to access this data.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/">IronKey password backup</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/01/21/ironkey-password-backup/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey Enterprise How-To</title>
		<link>https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/</link>
		<comments>https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/#comments</comments>
		<pubDate>Fri, 14 Jan 2011 02:38:05 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[secure session service]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[review]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=58</guid>
		<description><![CDATA[<p>Secure Active UK provides a picture tutorial on the IronKey Enterprise, an option for companies or businesses with two or more IronKeys, which enable the administrator to fully control the devices including the ability to remotely disable and wipe the devices if necessary. Device logs are also available so that companies can be in control [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/">IronKey Enterprise How-To</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Secure Active UK</strong> provides a picture tutorial on the <a href="http://www.ironkey.net.nz/index.php?cPath=249"><strong>IronKey Enterprise</strong></a>, an option for companies or businesses with two or more IronKeys, which enable the administrator to fully control the devices including the ability to remotely disable and wipe the devices if necessary. Device logs are also available so that companies can be in control of what their employees are doing.</p>
<p>Complete with screenshots, the Secure Active review provides a step by step look at how the Enterprise works.</p>
<p>View the article <a href="http://blog.securityactive.co.uk/2010/01/14/ironkey-s200-enterprise-review/">here.</a></p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/">IronKey Enterprise How-To</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NZX-listed Company for Tech Investors</title>
		<link>https://www.ironkey.net.nz/2010/12/23/nzx-listed-company-for-tech-investors/</link>
		<comments>https://www.ironkey.net.nz/2010/12/23/nzx-listed-company-for-tech-investors/#comments</comments>
		<pubDate>Thu, 23 Dec 2010 03:47:59 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[investment]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[NZICT]]></category>
		<category><![CDATA[technology]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=39</guid>
		<description><![CDATA[<p>NZICT, the tech industry association, is chatting to a number of potential parties about a publicly listed company which allows for investment in small technology companies. Endeavour Capital Chairman Neville Jordan is keen on the idea, as he believes that investors are looking for liquidity. What would be the range of tech businesses available? Perhaps [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/23/nzx-listed-company-for-tech-investors/">NZX-listed Company for Tech Investors</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>NZICT, the tech industry association, is chatting to a number of  potential parties about a publicly listed company which allows for  investment in small technology companies.</p>
<p>Endeavour Capital Chairman Neville Jordan is keen on the idea, as he believes that investors are looking for liquidity.</p>
<p>What  would be the range of tech businesses available? Perhaps a cutoff at  the $50 million mark, which is where private businesses tend to stall  due to not enough capital, says the CEO of NZICT.</p>
<p>Timely for 2011, and a good step towards investment in NZ technology.  Full article available <a href="http://www.stuff.co.nz/technology/digital-living/4477251/Its-time-for-an-NZX-listed-tech-fund">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/23/nzx-listed-company-for-tech-investors/">NZX-listed Company for Tech Investors</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2010/12/23/nzx-listed-company-for-tech-investors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey Personal Review</title>
		<link>https://www.ironkey.net.nz/2010/12/17/ironkey-personal-review/</link>
		<comments>https://www.ironkey.net.nz/2010/12/17/ironkey-personal-review/#comments</comments>
		<pubDate>Fri, 17 Dec 2010 01:13:46 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[ironkey personal]]></category>
		<category><![CDATA[secure session service]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[IronKey Personal review]]></category>
		<category><![CDATA[secure backup]]></category>
		<category><![CDATA[secure storage]]></category>
		<category><![CDATA[secure USB]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=30</guid>
		<description><![CDATA[<p>For those with patience for an in-depth review, Net-Security has undertaken a detailed review of the Ironkey Personal. The review is of a Personal 1GB, the smallest available storage for this device, the IronKey Personal is also available with storage space up to 32GB.  It covers key areas including the Verisign Identity Protection capabilities, AES [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/17/ironkey-personal-review/">IronKey Personal Review</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>For those with patience for an in-depth review, Net-Security has undertaken a <a href="http://www.net-security.org/review.php?id=216">detailed review</a> of the <strong>Ironkey Personal</strong>.</p>
<p>The review is of a <a href="http://www.ironkey.net.nz/product_info.php?products_id=1259">Personal 1GB</a>, the smallest available storage for this device, the <a href="http://www.ironkey.net.nz/index.php?cPath=248">IronKey Personal</a> is also available with storage space up to 32GB.  It covers key areas including the Verisign Identity Protection capabilities, AES CBC-mode encryption for the hardware, use of the lost passwords authorisation feature (provided the device is activated online).</p>
<p>The secure backup drive is also discussed in detail, in which the data from the device is transferred to an encrypted archive located on a local computer or network share, copying all the the secure files and private data which is marked &#8216;hidden&#8217; on Windows computers.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2010/12/17/ironkey-personal-review/">IronKey Personal Review</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2010/12/17/ironkey-personal-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
