IT Risks Rise on USB Drives
“Most people think of these things as storage sticks. What they don’t realize is the U3 is a little computer on a thumb drive,” Pescatore said.
Companies need to think seriously about managing USB storage devices, said Jonathan Singer, an analyst at Yankee Group Research Inc. in Boston. “You canhave a user walk away with awhole bunch of information, or someone’s PCs could get owned by a USB device they picked up in a parking lot,” he said.
Anderson said those concerns prompted Lincoln Health to install software from SecureWave SA that lets administrators manage access of USB drives to computers. SecureWave’s product lets Lincoln Health prevent multiple USB device types from being connected to its systems. IT can also monitor and audit activities in the cases where end users are permitted to connect USB devices to their systems.
Fabi Gower, vice president of IT at Martin, Fletcher, a health care company in Irving, Texas, has also deployed similar technology from SecureWave. She said she is reasonably confident that it should protect against threats such as those associated with the U3 flash drives. “Our security measures prohibit any applications from being installed or running on the network unless it has been authorized,” Gower said. SecureWave provides a way to enforce this at the USB device level, she said.
In one sense, the threat is not new, said Robert Wesley McGrew, a research student in computer security at Mississippi State University in Starkville. For example, the ability to install malicious code on removable systems via CD-ROMs has existed for several years, he said. What makes the U3 threat dangerous, though, is the fact that the devices can retrieve and store data, he added.
Read more about Data Storage in Computerworld's Data Storage Topic Center.
- Data Warehouse Augmentation: The Queryable Data Store While organizations have, to date, been busy exploring and experimenting, they are now beginning to focus on using big data technologies to solve...
- Rebranded Quadmark revamps its IT solutions with Google Apps Switching to Google Apps halved Quadmark's IT admin costs while achieving 10% time savings per employee. The global consulting firm now spends 80%...
- CrashPlan PROe Security Because mobile laptops often are connected to unsecured networks, a very high standard of security is required to ensure privacy.
- Protecting Digitalized Assets in Healthcare Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- Make or Break: New Auto Products Must Go To Market On Time This Webcast quantifies the value of time to market for the auto industry and highlights how Primavera Enterprise Portfolio Management can help organizations. All Data Storage White Papers | Webcasts