Securing Your Data at the Hardware Level

By | Blog, Cyber Security, Secure memory, SSD, Uncategorized | No Comments

In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning is key to securing embedded memory. Partitioning is also great for achieving higher reliability and…

Read More

Serial EEPROM: Fixed in Place or Removable?

By | Uncategorized | No Comments

There are many ways of incorporating this popular memory type into your embedded system, but one of the early questions to ask yourself is: permanent installation or have the ability to easily replace the EEPROM? Electrically erasable programmable read-only memory (E2PROM but more commonly called EEPROM) is one of five common non-volatile memory (NVM) types. Here’s how they compare: Read…

Read More

Enhancing Embedded Cyber Defences

By | Uncategorized | No Comments

Datakey’s new CryptoAuthentication™ tokens, now available in the UK, Ireland, Germany, Austria, Switzerland and Scandinavia from Nexus Industrial Memory.   The line comprises four products; the IAT4.5Kb, the IAX4.5Kb, the IAT10.5Kb and the IAX10.5Kb. All are ideal for embedded systems that require ‘cyber robust’ removable memory devices for applications that include the transfer of passwords (or other data needed for user…

Read More

Are we seeing you?

By | Uncategorized | No Comments

We’re exhibiting at the Southern Manufacturing and Electronics Show at Farnborough International in February as usual and it would be great to see you there. Over on our stand (D85), we’ll be focusing on cyber security and offering loads of advice about: How to protect data transferred via removable memory devices How to reduce the risk of malware being introduced…

Read More

Killer app

By | Blog, Uncategorized | No Comments

Do you know what accountants used before Excel and other spreadsheet software was invented? Pen and paper. Seems pretty obvious really, but when you consider how complex software is these days, and the hugely intricate operations they’re required to complete, you wonder how on earth anyone could have done any of this stuff without a computer. So, how did they?…

Read More

Name in lights

By | Uncategorized | No Comments

I hope you’ve had a fantastic weekend and a good start to the week? Mine was mainly spent unpacking bags after a wonderful family holiday in Devon – thankfully we got the most of the heat before the heavens opened! Anyway, I write with exciting news: Datakey are in with a fantastic chance of winning an award. As you probably…

Read More

Tis the season

By | Blog, Uncategorized | No Comments

You could be forgiven for thinking that I was going to launch into a message about Christmas, but given that we’re only just into May, that’d be a little incongruous. You’ll be relieved to know that it’s not the festive season I wanted to talk about – it’s the exhibition one. It seems to be that this time of year…

Read More

Your sharpened saw

By | Blog, Uncategorized | No Comments

I was out of the office at a business event last week. And it was massively helpful. Every month or so, I like to take time out of the day-to-day to learn new strategies that’ll help me grow my business and rub shoulders with other business owners. It gives me new impetus to get things done. It makes me realise…

Read More

Misusing your equipment

By | Blog, Uncategorized | No Comments

I was talking to a company in the Agricultural machinery sector when I discovered something that shocked me. They spend six figure sums fixing warranty claims for one of their product lines. When the claim first comes in, they generally just sent out a replacement part. And when the second or third from the same customer comes in, they’ll have…

Read More