Covid-19 Vaccine Research Organisations Under Siege By Hackers

Kanguru Military-Grade AES Hardware Encrypted USB Drives Can Help Protect Sensitive Data.

News media have announced that hackers from China and other countries are laser-focused on trying to hack in and steal information from research organisations working on a vaccine for the Coronavirus epidemic to create their own.

“The most valuable intellectual property in the world right now is to do with Covid vaccines,” states Robert Hannigan, Former Director of Government Communications Headquarters (GCHQ).

The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency and the U.K’s National Cyber Security Centre released a joint alert indicating an “Advanced Persistent Threat,” which is “actively targeting organisations involved in both national and international Covid-19 responses.”  Particularly under siege are areas of healthcare and academia; any areas related to Covid-19 research for vaccines, tests and treatment, including university labs, hospitals, medical facilities, government agencies, and pharmaceutical companies.

Kanguru Defender® AES 256-Bit, Hardware Encrypted USB Drives are specifically designed and built to defend against this type of assault from hackers. With military-grade, FIPS 140-2 Certification, Defender secure flash drives, hard drives and solid state drives help protect information off the grid from the internet, and work from home or any remote location under full 256-bit hardware encryption.

Protect your organisation from these attacks, with:

  • Military-Grade, AES 256-Bit Hardware Encryption (XTS Mode)
  • High-Level FIPS 140-2 Certification
  • New Large Capacity Storage Flash Drives Up To 256GB
  • Secure Defender HDD Up To 5T and SSD Up To 2T Data Storage
  • Option To Remotely Manage With Kanguru Remote Management Console (KRMC)
  • Onboard AntiVirus, Real-Time Scanning Protection by Award Winning BitDefender®
  • Brute-Force / Tamper-Proof Protection
  • RSA-2048 Digitally-Signed, Secure Firmware
  • TAA Compliance