123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Usb Sticks With Employees - A Threat To Information Security

Profile Picture
By Author: Contact Press
Total Articles: 7
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The technological revolution has also posed new challenges in ensuring information security. The same products, which have been developed to increase convenience and increase productivity, can be misused by individuals. Employee initiated security breach is a major challenge faced by organizations. It is often difficult to detect employee initiated theft or security breach as they may be carried out in the course of their daily routine. Conducting vulnerability assessment tests and ethical hacking practices can help organizations in identifying vulnerabilities and suspicious activities.

USB sticks designed primarily to store useful information can be misused by employees to store privileged business and customer information. Storage of privileged information may be done with a malicious intention by a disgruntled employee or due to lack of awareness. A recent survey report by Credent Technologies indicates that majority of the employees in its survey carry USB sticks to Office.

Users generally ...
... use unencrypted USB devices, which if accessed by an outsider can reveal confidential business information. Again, these devices are left unsecured in table racks or left attached to USB ports on computers and laptops.

Recently, Avast Virus Labs revealed that one in eight malware attacks are launched via a USB device. The auto run feature offered by Microsoft Windows, automatically gets executed when a USB device is inserted into USB port. As such, files containing virus may also get executed, thereby compromising information security. Disabling auto run feature can prevent automatic execution of malicious files.

Many Multi-national organizations allow flexible working hours and facility to work from home to coordinate with offices in different time zones. As such, some employees may be use USB devices to store data and reports. However, loss of USB devices or their use on unsecured networks may result in compromise of crucial business information.
Information Security professionals must create awareness among employees on the risks of inappropriate use of USB devices. Organizations may also place restrictions on the use of USB devices. Any inappropriate practice by employees can also be detected by installing monitoring devices.

Total Views: 105Word Count: 339See All articles From Author

Add Comment

Computers Articles

1. Time Attendance Management System At Only 1sgd Per Month
Author: James

2. Nfc Guard Tour System Singapore @ 30sgd Per Month
Author: James

3. Virtual Guard Fencing @ 30sgd Per Month
Author: James

4. Guard Patrol Tour System @ 30sgd Per Month
Author: James

5. Best Payroll Software In Singapore @ Exiga Software
Author: James

6. Smart Barcode Gps Time Management Singapore
Author: James

7. Future Of Ccaas: Predictions For Customer Service Innovation Beyond 2026
Author: Umangp

8. Hire Affordable Android App Developers For Custom Mobile Solutions
Author: web panel solutions

9. Top Ai Development Mistakes And How To Avoid Them
Author: brainbell10

10. Social Media Platforms & Their Evolving Role In Search Engine Marketing (sem) In 2026
Author: sochtek

11. Best Shopify Web Design Company Delivering Scalable E-commerce Solutions
Author: web panel solutions

12. Why Do Certified Technicians Matter In Computer Repairs?
Author: computerrepairservices

13. Quality Assurance Tutorial: Everything You Must Know To Build High-quality Software
Author: Tech Point

14. Understanding Manual Testing In Simple Words
Author: Tech Point

15. How Is The Dish Antennas Market Evolving With New Technologies?
Author: komal

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: