You can find them in pockets, purses and on key chains. They're on lanyards and in pens, built into some jewelry and even found alongside scissors and nail files in Swiss army knives.
Teeny USB thumb drives are ubiquitous: In fact, Gartner estimates more than 222 million were sold in 2009 alone.
Could such a tiny gadget bring big risks to your organization?
Your Data at Risk
Thanks to their small size, low cost, and capability of instant backup and file transportation between multiple computers, USB drives actually pose significant security threats for businesses.
For example, disgruntled employees can easily make off with sensitive company information on a USB drive. "The threat is not new, but the problem is exacerbated by tiny and cheap USB drives," says Leslie Fiering, research vice president at Gartner in San Jose, Calif. "The moment we had removable storage media -- going back to floppy disk drives -- there have been stories of janitors going onto computers after hours and downloading major amounts of information." Employees who plan on quitting a company -- or perhaps those expecting a pink slip -- can also easily copy over customer or client databases, emails, calendar appointments and contact lists in a matter of seconds, and then take this digital info with them to a competitor.
Increasingly, USB drives can also carry harmful malware, say security experts. USB keys can be used to install viruses or to serve as boot drives to erase data -- even unintentionally. An employee who uses a USB drive on a personal computer at home could carry malware back to a work computer without his or her knowledge.
USB Security: What You Can Do
You should take several precautions to minimize the risk of data theft or malware attacks via USB drives. Consider the following:
Implement strong security software
All company computers should have the right security software to detect and remove potential threats. "Without question, you need serious protection today that not only protects from online threats but also is capable of scanning external devices too, such as USB drives," warns Fiering.
Limit USB access
In extreme cases, organizations have cut off access to USB ports. Others have limited USB access to specific employees. Using encrypted USB drives is another option, as is disabling AutoRun on computers so that programs on a USB drive don’t immediately run when a drive is inserted.
Keeping track of USB access will help you note who is using the drive, on which computer and at what time of day." IT departments need to make sure their machines are secure and sensitive information protected," adds Michael Gartenberg, research director at Gartner in Stamford, Conn.
Focus on education.
“Banning can result in users trying to bypass the ban,” cautions Santorelli. A usage policy augmented by an awareness campaign to educate end users will help mitigate the risks.
Fiering and Santorelli note that these risks are not limited to USB drives. Santorelli calls it an “erosion of the traditional network perimeter” because of the prevalence of mobile devices and the convergence of personal and work technology. “This is a problem that's not going away any time soon," says Fiering. With the right security measures, however, companies can ensure the security of their data, despite today’s increased risks.
IT Insider is a daily editorial resource offering innovative insights and strategies for building an integrated, secure and resilient IT infrastructure.
Available at Amazon.com:
- 5 Cloud Tools to Boost Your Productivity
- Mobile Pay Can Give You an Edge
- How to Find the Best Deals Online
- Should You 'Friend' Your Teens Online?
- Should You Really Post That Comment?
- 5 Smart Tactics for LinkedIn Self-Promotion
- How Repressive Regimes Use the Internet to Keep Power
- WikiLeaks: Diplomacy as Usual
- The Rising Threat of USB Drives
- Integrate Cloud Solutions With Caution
- Tech Solutions to Track Your Resolutions
- Crash Course in Computer Maintenance
- How to Pick the Right Cloud Provider
- Web Tools for Starting a Small Business
- 4 Life-changing Resolutions You Can Stick to
- Create Your Own Social Network
- What the Web Says About You
- FTC Chairman: 'Do Not Track' Rules Would Help Web Thrive
- 'Do Not Track' Rules Would Put a Stop to the Internet As We Know It
- Are Federal 'Do Not Track' Rules Needed?
- The Political Power of Social Media
- Top 3 Kid-safe Social Networks
- 5 Ways to Cultivate Your Kids' Online Reputation
- Preparing Our Children for Global Digital Citizenship Success
- The Great E-reader Roundup
- The NFL's Highest-scoring Apps
- New Gadgets Straight From the Big Screen
- A Game Plan for Protecting Stored Data
- The Drive for Real-time Collaboration
- Hang Onto People Who'll Help You Advance
- Leading New Developments in Visual Computing
- Meet Mr. Industrial: Justin Lassen's Music Machine
- Must-see TV on the Internet
- Share Safely on Social Networks
- 6 Essential Rules for Safe Online Shopping
- Five Steps to Kid-friendly Surfing
- High-tech Help for Weight Loss
- Create a Web Site or Blog for Your Family
- Video Eyewear for Sunglass Cinema
- Smart Phone Apps Help Stop Distracted Driving
- Online Computer Backup Services Remove Hassle
- Cut Your Carbon Footprint and Save Money With New Gadgets
- The 25 Best Apps for iPads, iPhones and Droids
- Government Takes a Step Toward Cloud Computing
- Is Our Obsession With Internet-Based Media Veering Into Addiction?
- Stop Information Overload
- Cool Technology Tools for a Carefree Life
- Apple iPhone versus Google Android
- Apple Enters Rental Biz
- Cool Technology and Gadgets for Hot Summer Fun
- Smart Tools For a Paperless Home
- Formspring.me - Teens' Ugly Scrawlings Go High Tech
- Guide to Great Educational Websites for Kids
- 5 Social Media Tools for College Students
- 5 Do's and Don'ts for College Students Using Social Media
- Is Facebook Killing Your Mojo?
- Internet Safety Tips for Teens
- 10 Cool Gadget Gifts for Grads
- New DVR Recorders Do More Than Record TV
- 4G Networks Promise True Wireless Broadband
- Tools That Make it Easy to Network Home PCs
- GPS: Cool Devices That Know Where They Are
- Ultimate HDTV HD Television Buying Guide
- How to Save With Cutting-Edge Tech
- Suddenly Instant Photos Are Everywhere
- Technology Opens Doors for Investors
- The Art of Self-Marketing Online
- Is Your Next Job a Click Away?
- Archiving Twitter Tweets: Dumbing Down Journalism
- These Financial Blogs Are Worth Your Time
- iPad Launch: Perils of the iPad
- iPad Launch: What Buyers Need to Know
- Apple's iPad: 5 Reasons Why the Apple Tablet Will Flop
- Apple's iPad: The Good, the Bad and the Ugly
- 'Dotcom' Turns 25: Predictions for What Comes Next
- Costly Incompatible Glasses Threaten 3D TV Sales
- Mobile Tech That Stole the Decade
- The Biggest Technology Flops of the Decade
- M.B.A. Programs Are Biting Apple's iPad
- Democracy in Cyberspace
- The Digital Disruption
- Bashing Bosses on Social Media
- New Applications Turning Cell Phones Into Medical Devices
- Job Hunting With Smart Phones
- Nobel Winner Right About Risks of e-Books
Copyright © 2011 Studio One Networks. All rights reserved.