While a data breach by itself can be disastrous for any companyrsquo;s reputation and bottom line, in the age of the GDPR, data protection legislation makes the consequences even more severe.Limiting the Use of USBsSome companies choose to limit the use of USBs. When a careless employee lost a USB with over 1,000 confidential files, including highly sensitive security and personal information, Heathrow Airportwas finedpound;120,000 by the UK Information Commissionerrsquo;s Office.With the risks so high, some sectors have chosen to ban USBs altogether, but there is no denying their usefulness on the go where they are often used to copy presentations, important documents needed for meetings or off-site printing. A seemingly harmless lost USB can be riddled with malware, infect a computer, and, if it is a work laptop, once it returns to the office, it can go on to infect the whole network.Some tools, like Endpoint Protectorrsquo;sEnforced Encryptionsolution, can be deployed automatically by admins to all trusted USB storage devices when they are connected to a network computer.These policies, if applied on the endpoint, will also work remotely, ensuring that computers are protected when outside the safety of the company networkEncryption for USBsWhen it comes to company-issued USB storage devices, organizations should consider encryption as an easy way to protect any information saved on them. If someone finds a USB in a public place, he or she may want to return it to its owner or would be curious to Wholesale Linen Face Masks see what is on it.

In this way, even if USBs are lost, forgotten, or stolen, the information on them cannot be accessed by outsiders without a password, eliminating the risk of a data breach and the hefty fines that come with it. By, among others, using a system of trusted devices and applying encryption to files transferred onto USB storage devices, organizations can effectively mitigate the risks that come with their use. A well-informed workforce is more aware of the risks USBs pose and are better equipped to react if they are faced with a suspicious device. Companies must develop data protection strategies that also address their vulnerabilities as devices through which data transfers occur, but also their increasingly common role in cyberattacks. Once itrsquo;s installed, any data copied onto the USBs will be encrypted with government-approved 256bit AES CBC-mode encryption. Since 2008 when a malware-infected USB flash drive causedthe worst breachof US military computers in history, organizations have become more aware of the dangers USBs pose, but data security strategies rarely deal effectively with them. Employees can connect personal USBs or flash drives of dubious origin to their work computers. Third parties can plug in infected USBs in a moment of carelessness from an employee travelling for business.USB storage devices have long been a plague to companiesrsquo; data security. So how can companies continue to use USBs, but ensure they are protected against the biggest risks that come with them?

Letrsquo;s have a look!Educating EmployeesA popular social engineering technique to infect computers relies on individualsrsquo; curiosity or desire to help others. Poor security practices at home can lead to unknowingly infected personal USBs connecting to the company network.In ConclusionUSB storage devices are a frequent and highly dangerous blind spot in data security practices. In this way, companies can ensure that only trusted devices can connect to a computer. This can be done throughspecialized softwarethat allows organizations to control a computerrsquo;s USB and peripheral ports and monitor, lockdown, and manage devices that connect to endpoints.Other features include the possibility to reset passwords remotely in case they were compromised, limiting the number of times someone can insert a password as well as expiry dates for them. Trusted devices can be USBs issued by the organization or reliable vendors or only secure devices such as those using encryption. USBs are small and, therefore, easy to lose, forget, and steal.The reasons for it are fairly simple: USB drives tend to leave the confines of company networks where security policies are at their strongest.It is, therefore, essential that employees understand the risks of unknown devices and are discouraged from connecting suspicious USBs to their computers, whether at home or while working.

Poor security practices at home can lead to unknowingly infected

to ,the ,a ,can ,usbs ,of ,can be ,storage devices ,of the ,usb storage ,they are ,poor security practices ,storage devices organizations

مشخصات

آخرین ارسال ها

آخرین جستجو ها


یوشا آل ایوب biagecalli توتال_وار پرشین winkgirl باشگاه کوهنوردی کاراکال Walter انجمن لاله های نسار گروس china authentic wholesale jerseys & free shipping delnazbano ماراتن تا موفقیت