Toshiba introduces SD memory card ... 8GB

Toshiba intends to launch another

Toshiba plans to launch a "bomb" next year, a Secure Digital (SD) card that is stunned to 8GB, equivalent to 2000 songs or 2500 photos taken with a 6-dot digital camera.

With an approximate size of a postage stamp, SD card is widely used in portable electronic devices, from digital cameras to camcorder and PDA. What makes Toshiba's new card unique, beyond its "massive" capacity, is its ability to record data at speeds up to 6 Mbps.

At that rate, the new card is perfectly suited for high-end cameras like the Panasonic HDC-SD1 1080i, as these devices often capture data directly onto the card.

Tiny terrorist?

Picture 1 of Toshiba introduces SD memory card ... 8GB
Source: Sdcard.org Although the new type is very impressive, it can also cause information managers who are in charge of data centers to protect their top-secret information network from employees " two bearing ".

"The risk of hand in hand has increased dramatically over the past few years ," said Forrester expert Khalid Kark. Kark believes that the risk from such large and mobile storage tools will certainly escalate in the near future.

" More specifically, we have seen the reverse side of USB drives. It is very difficult for businesses to manage this issue because how to manage the tiny USB drives that everyone can hide in their bodies. ".

Indeed, USB drives, SD cards, Compact Flash cards and Memory Sticks cannot be separated from essential devices for modern human life such as cell phones, smartphones, MP3 players . No one can ban employees bring these devices into the office.

With a $ 20 card, any lame employee, if you intend to, can draw thousands, millions of customer names, phone numbers, birth dates and worst: health status or data credit card information.
Leaking information

In response to this risk, some businesses have installed software to prevent information leakage (ILP). This software specializes in monitoring the intranet, detecting and blocking storage tools that are illegally connected to the system.

According to expert Kark, some ILP software can even distinguish between sensitive data and, normally, allocate access to users differently depending on the sensitivity of the information.

The result? If in the past, companies were obsessed with what would "jump" into their networks - viruses, spyware, and malware, now they are only worried about what will be leaked out.

Trong Cam

Update 13 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment