USB Devices!

USB Devices!

I've been stating and teaching this for years. Why do organizations continue to allow USB / data access on their corporate computers and systems?

Loss of IP/data and malware breaches will surely result and the stats don't lie.

In the past few years, many organizations are attempting to track down the loss of sensitive/confidential information due to the usage of USB drives and other mass storage media. Cyber-security breaches and data theft are making more and more IT leaders paranoid about security than ever before.

Why are USB devices dangerous?

  • USB devices can hold a lot of information. For example, a 128 GB USB flash drive can store 60,000 photos, 20,000 songs, 100+ videos, and more. Just imagine how many protected corporate files could fit on one drive. Also, the storage capacity of USB devices is only going to increase.
  • USB devices are super portable. Some USB storage devices are the size of a small coin. This makes them very difficult to visually detect when plugged into an open port.
  • USB devices are cheap and easy to find. If you’re in the market for a USB storage device, there are some online for under $1.00 USD. Or if you don’t want to purchase one, just go to an expo. Plenty of companies are handing out branded USB flash drives these days. In short, nearly everyone has a USB storage device of some kind.
  • Data doesn't always delete from a USB drive. In one study, it was determined that 85% of secondhand USB devices had recoverable information including personal identity information and confidential corporate information easily.
  • USB devices can directly carry malware. Inserting a device and executing or copying files could expose your network to unexpected malware.

What can an internal data breach result in? The loss or theft of sensitive information is not limited to the realm of emails and contacts, but it can also extend to more sensitive information such as:

  • Loss of copy-righted information
  • Intellectual property data
  • Deviation from compliance regulations
  • Access codes and secure login credentials

So, in short - if you're responsible for data integrity, security or the technology of your organization, you may want to consider blocking USB ports using tools like LanDesk, etc.

To view or add a comment, sign in

More articles by James King

  • Disconnect!

    Ensure that when you work hard, you play hard. Somewhere in between, disconnect and get that much needed downtime.

    3 Comments
  • Compliance Engine beta-launch

    Multi-project, multi-jurisdiction white-label crowdfunding platform!

    2 Comments
  • The Dangers of online password vaults

    I've been warning for years that if you're going to use an APP or service to manage your accounts or passwords, you…

    10 Comments
  • DDos Attacks

    Distributed Denial of Service (DDoS)1 attacks against the Web sites of State, Local, Territorial, and Tribal…

    2 Comments
  • Patch it now! (MS HTTP bug)

    1 This isn't an IIS bug, so it doesn't apply only to IIS servers. As far as we can see, the bug affects pretty much any…

    2 Comments
  • Microsoft FREAK!

    Action Required: If you run a server … You should immediately disable support for TLS export cipher suites. While…

  • I love Utah!

    So often I am asked: "Why do you live and stay in Utah"? My answer is simple. Where else in America can you be up at…

    9 Comments
  • Go-Go in flight serving up bogus SSL Certs!

    This specific bulletin really saddens me as I have been an active subscriber to this service. Again, as many are…

    3 Comments
  • Utah Business Fast50

    MasterControl again named to the Utah Fast50 as the 36th fastest growing business in Utah! Congrats to the entire staff…

    5 Comments
  • MasterControl v11 has launched!

    http://mastercontrol.com/v11/ Sometimes accelerating your business means growing and expanding.

Others also viewed

Explore content categories