KAPPA TECHNOLOGY BLOG 

  • Lucy Hoover

USING CAUTION WITH USB DRIVES


WHAT SECURITY RISKS ARE ASSOCIATED WITH USB DRIVES?

USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and portable, so they are popular for storing and transporting files from one computer to another. However, these same characteristics make them appealing to attackers.


Attackers can use USB drives to infect other computers with malware that can detect when the USB drive is plugged into a computer. The malware then downloads malicious code onto the drive. When the USB drive is plugged into another computer, the malware infects that computer.


Some attackers have also targeted electronic devices directly, infecting items such as electronic picture frames and USB drives during production. When users buy the infected products and plug them into their computers, malware is installed on their computers.


Attackers may also use their USB drives to steal information directly from a computer. If an attacker can physically access a computer, he or she can download sensitive information directly onto a USB drive. Even computers that have been turned off may be vulnerable because a computer's memory is still active for several minutes without power. If an attacker can plug a USB drive into the computer during that time, he or she can quickly reboot the system from the USB drive and copy the computer's memory, including passwords, encryption keys, and other sensitive data, onto the drive. Victims may not even realize that their computers were attacked.


The most obvious security risk for USB drives, though, is that they are easily lost or stolen. If the data was not backed up, the loss of a USB drive can mean hours of lost work and the potential that the information cannot be replicated. And if the information on the drive is not encrypted, anyone who has the USB drive can access all of the data on it.

How can you protect your data?

There are steps you can take to protect the data on your USB drive and on any computer that you might plug the drive into:

  • Do not plug an unknown USB drive into your computer. If you find a USB drive, give it to the appropriate authorities (a location's security personnel, your organization's information technology [IT] department, etc.) Do not plug it into your computer to view the contents or to try to identify the owner.

  • Take advantage of security features. Use passwords and encryption on your USB drive to protect your data, and make sure that you have the information backed up in case your drive is lost.

  • Keep personal and business USB drives separate. Do not use personal USB drives on computers owned by your organization, and do not plug USB drives containing corporate information into your personal computer.

  • Disable Autorun. The Autorun feature causes removable media such as CDs, DVDs, and USB drives to open automatically when they are inserted into a drive. By disabling Autorun, you can prevent malicious code on an infected USB drive from opening automatically.

  • Use and maintain security software, and keep all software up to date. Use a firewall, antivirus software, and anti-spyware software to make your computer less vulnerable to attacks, and keep the virus definitions current . Also, keep the software on your computer up to date by applying any necessary patches.

Meeting

GET A MANAGED IT SERVICES QUOTE FOR YOUR BUSINESS TODAY

REQUEST A QUOTE
OR CALL
407.331.5921
  • Facebook - White Circle
  • LinkedIn - White Circle
  • YouTube - White Circle
Kappa Computer Systems, Manged IT Service and Support Orlando, Altamonte Springs Florida

Orlando's Trusted Managed IT Service Provider and IT Support Professionals for over 20 Years

© 2020 by Kappa Computer Systems LLC

767 Stirling Center Place, Unit 1401

Lake Mary, FL 32746

Support@KappaServices.com |   407-331-5921

Kappa Services managed IT service and IT support in Orlando, Florida provides many benefits designed to free your business from the necessary but time-consuming chores of monitoring and managing your IT network infrastructure. We strive to help simplify IT by cultivating and sustaining a solid IT foundation and IT business strategy for your business.