Hewlett-Packard’s tiny Memory Spot chip is designed to put digital information on documents and photos. However, the chip’s size and wireless capability can also be used by corporate thieves to copy and steal valuable data.While the Memory Spot presents an added security challenge for companies, the risk can be managed, said James McQuivey, a professor at Boston University’s College of Communication.Unveiled on Monday, the prototype Memory Spot is roughly the same size as a grain of rice and can store up to four megabits of information. There are eight bits in a byte. The chip has an antenna that can transfer data at speeds up to 10Mbps and doesn’t require its own power source. Instead, the chip draws its power from a chip reader through a process called inductive coupling, which allows power to cross from one component to another over a shared electromagnetic field. HP’s Memory Spot Data stored on Memory Spot chips could be accessed using a variety of devices, such as specially equipped cell phones or PDAs, making them suitable for a range of applications, such as stickers applied to a paper document or printed photograph, HP said. There are other possibilities. Memory Spot, which is not expected to be commercially available for several years, is just one of many devices that can be used by thieves to download and steal corporate information. Corporate security managers already face this threat from USB flash drives, portable hard disks, camera-equipped cell phones and other devices.“If you can’t manage those today, the Memory Spot will be just another in a long line of possible data loss devices,” McQuivey said. Companies that have put strong security policies in place will be able to handle advances in technology that make it possible to steal data, he said. Memory Spot also offers an opportunity for companies, which can use them to disseminate product brochures and even video, such as commercials, McQuivey said. “This can be as much a positive thing for companies as a negative,” he said.-Sumner Lemon, IDG News Service (Beijing Bureau)Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Palo Alto Networks Operational technology systems require a robust Zero Trust strategy in 2024 Zero Trust provides a foundation for creating a stronger security posture in 2024. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security brandpost Sponsored by AWS in collaboration with IBM How digital twin technology is changing complex industrial processes forever As the use cases for digital twins proliferate, it is becoming clear that data-driven enterprises with a track record of innovation stand the best chance of success. By Laura McEwan Dec 05, 2023 4 mins Digital Transformation brandpost Sponsored by AWS in collaboration with IBM Why modernising applications needs to be a ‘must’ for businesses seeking growth Around one-third of enterprises are spending heavily on application modernisation and aiming for cloud native status. The implications for corporate culture, structure and priorities will be profound. By Laura McEwan Dec 05, 2023 5 mins Digital Transformation opinion 11 ways to reduce your IT costs now Reorienting IT’s budget toward future opportunities is a big reason why CIOs should review their IT portfolios with an eye toward curbing unnecessary spending and realizing maximum value from every IT investment. By Stephanie Overby Dec 05, 2023 11 mins Budget Cloud Management IT Governance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe