Techniques for securing data are disclosed. A security device includes: one or more processors; one or more authentication components including one or more of a biometric reader, a positioning system, and a wireless receiver; and one or more non-transitory computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including securing data on a storage device that is external to the security device, using multiple authentication factors obtained using the one or more authentication components.