Are USB Drives Safe to Use in Your Organization?

Does your company have any policies in place regarding how USB drives are used?

 

USB drives have been popular for quite some time, especially for busy employees who need quick access to data across various machines. Individuals can carry a USB drive around with them and move data between computers with ease.

While there’s no denying their ease of use, this flexibility doesn’t come without several shortcomings. A study published by Apricorn revealed some shocking statistics. The study showed that 87% of those surveyed had either lost or had a USB drive stolen without notifying their employer. Also, less than 50% of organizations require the deployment of encryption for data stored on USB drives.

 

Risks associated with using USB drives in your organization

 

If your organization doesn’t have a strong policy on how USB drives are used, you should understand the risks they pose:

Malware Threats

 

USB drives can be reprogrammed in many ways – not only to gain access to their contents but also to infect any device they’re connected to. This can allow the drives to spread malware across an entire network quickly. USB drives can be programmed to automatically run certain programs when they’re inserted into a computer. Many times, hackers will configure these drives to run a malicious program that installs malware, edits files, or locks down a computer. At a minimum, users should always use a malware scanner to ensure the safety of any accessed files on a USB drive.

Data Loss/Theft

 

Because most USB drives are not encrypted, major problems can arise if they are lost or stolen. While hackers typically must infiltrate corporate networks to access sensitive data, accessing a stolen or lost USB drive skips this step. Organizations that are subject to cybersecurity regulations must pay special attention to the use of USB drives because there may be rules in place that prohibit the storing and disseminating of data via external or unencrypted devices.

Ability to Boot to USB Drives

 

Not only can USB drives be used as a vector to load malware and other questionable information onto a company’s network, but they can also be used as a boot device. This means that someone could place a USB drive into a machine and boot to the USB drive,  giving complete control to whatever application or operating system is being used by the USB device.

How to Protect Against the Dangers of USB Drives

 

There is no 100% foolproof way to protect yourself and your employees from the risks of USB drives, but there are some strategies you can use to mitigate these risks. These include:

Network Computer 02 South Florida Managed IT Support Malware protection

As mentioned above, all USB devices should be scanned for malware before being connected to a corporate network. This is often achieved by having a machine that is not physically attached to the corporate network and dedicated to scanning these devices.

Network Computer 02 South Florida Managed IT Support Avoid directly plugging in USB drives

Instead of plugging in a USB drive at each workstation, companies can utilize a USB security system to which drives are connected. Once connected, these devices can be scanned, and any files can be transferred to a corporate portal where data can be downloaded.

Network Computer 02 South Florida Managed IT Support Control User Access

Most operating systems control how USB devices function when connected to a computer. This can allow IT, admins to limit access to certain files like executable files or commonly-spoofed files – such as PDFs and MS Office documents – that can cause significant damage.

Leverage the cloud and avoid the dangers of USB drives

 

With advancements in cloud computing, many companies are exclusively using the cloud for file storage, which reduces the need for USB drives. If your company is currently relying too much on USB drives, it may be time to develop a new strategy to ensure your data is protected.

To learn more, give our team a call today at 954-880-0388 or reach out to us through our online contact form.

Start making your digital life more manageable

You might also like

Proactive Monitoring and Maintenance

Keep your business running & protected from external threats

Backup and Disaster Recovery

Recover & protect critical data from unexpected tragedies

Remote Employee Configuration and Monitoring

Secure your remote employee’s network access

Managed Antivirus and Malware Protection

Protect your business from sophisticated cyber attacks

Security Assessment and Training

Analyze your security posture & train employees to defend against the latest threats

Help Desk Access

Solve all your technical issues with a friendly & reliable helpdesk

Remote Setup and Monitoring

Protect remote workers with proper employee configuration

Network Management

Boost your productivity with efficient network management

Proactive Monitoring and Maintenance

Avoid downtime and fix issues as they arise

Backup and Disaster Recovery

Keep your business up & running throughout unforeseen events

Architecture Firms

Construction & Engineering

Non-Profit

Legal

Accounting Firms

Dental Offices

Hospitality

Small Businesses

Manufacture and Wholesalers