Author Archives: Ryk

How to handle a security breach

One of the most common methods to breach data that is supposed to be kept secure is the theft or loss of the physical assets containing secure data. All too often people leave portable computers, mobile devices and the like open and accessible for just about anyone. Claudiu Popa writes a simple five-step guide on what to do if and when you suspect privacy has been is breached.

Needless to say one extremely easy method to prevent privacy breaches is the use of Cicada Security Technology on all your computing devices.

Our Technology

Cicada has been developed to protect portable computing devices from theft or tamper in real world work environments. Designed to adapt to the way you work, Cicada provides the most effective real-time protection.

As an active theft and tamper trigger, Cicada provides strong value to vendors of encryption technologies by offering their clients the ability to add a reactive security system as a means to enhance content level security.

Presidium provides application specific, long shelf life asset protection that can be integrated in to a diverse range of assets. Based on the Presidium security controller, protected assets are covered against theft for up to three years, eliminating the need for periodic maintenance.

Engineered to operate in any country, Presidium can exchange information over any telecommunication network to provide accurate asset location data using NEMA standard geo-positioning data.