Share

A hard reality has hit Stefan Thomas of San Francisco, a programmer who kept the private keys to his digital wallet on a competitor’s hardware encrypted USB drive.  Storing such important data on a password-protected, secure USB drive is a great idea, however Stefan has forgotten his password and only has 2 attempts left before the drive lock’s away his data forever. Hardware encrypted USB  data storage provides the strongest protections  against unauthorized access and physical tampering, especially data stored on a FIPS 140-2 Certified USB drive.  Unfortunately his forgotten password is standing in the way between him and his $220 Million fortune in Bitcoin.

Kanguru realizes how detrimental it could be if critical data were to become inaccessible and unrecoverable due to a forgotten password.  Kanguru highly recommends two secure methods for password recovery for its Defender® hardware encrypted USB drives:  Self Service Password Management, and Kanguru Remote Management.

For less than ten dollars a year, Kanguru offers a subscription to Self Service Password Management™ (SSPM™), a secure, self-service password recovery option, allowing encrypted USB users to reset their password on Defender®  encrypted drives if they forget their password.  This service provides great peace of mind. Even if the user forgets the password, the information can be securely recovered.  $6.95 a year would have been a small price to pay for Stefan to recover his $220 million dollar fortune.

Even better, for only $14.95 a year, Stefan could have purchased Kanguru Remote Management Console™ (KRMC™) which provides organizations and consumers the option to remotely manage their secure USB drives anywhere in the world.  KRMC is a robust remote management service for IT Managers, Security Officers, or even consumers enabling them to manage all of their secure USB drives, reset passwords, locate lost/stolen drives, restrict use on certain domains, set security policies and much more.  KRMC also includes SSPM, so administrators can leave it up to the individual users to securely reset should they need to do so.