IT Risks Rise on USB Drives
“Most people think of these things as storage sticks. What they don’t realize is the U3 is a little computer on a thumb drive,” Pescatore said.
Companies need to think seriously about managing USB storage devices, said Jonathan Singer, an analyst at Yankee Group Research Inc. in Boston. “You canhave a user walk away with awhole bunch of information, or someone’s PCs could get owned by a USB device they picked up in a parking lot,” he said.
Anderson said those concerns prompted Lincoln Health to install software from SecureWave SA that lets administrators manage access of USB drives to computers. SecureWave’s product lets Lincoln Health prevent multiple USB device types from being connected to its systems. IT can also monitor and audit activities in the cases where end users are permitted to connect USB devices to their systems.
Fabi Gower, vice president of IT at Martin, Fletcher, a health care company in Irving, Texas, has also deployed similar technology from SecureWave. She said she is reasonably confident that it should protect against threats such as those associated with the U3 flash drives. “Our security measures prohibit any applications from being installed or running on the network unless it has been authorized,” Gower said. SecureWave provides a way to enforce this at the USB device level, she said.
In one sense, the threat is not new, said Robert Wesley McGrew, a research student in computer security at Mississippi State University in Starkville. For example, the ability to install malicious code on removable systems via CD-ROMs has existed for several years, he said. What makes the U3 threat dangerous, though, is the fact that the devices can retrieve and store data, he added.
Read more about Data Storage in Computerworld's Data Storage Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Using VM Archiving to Solve VM Sprawl This CommVault whitepaper discusses how archiving virtual machines can mitigate VM sprawl with a comprehensive approach to VM lifecycle management.
- Keep Your Network Available, Efficient and Secure Make the most of your network by working with experts who "get it." CDW and F5 have partnered to keep networks highly optimized....
- Make or Break: New Auto Products Must Go To Market On Time This Webcast quantifies the value of time to market for the auto industry and highlights how Primavera Enterprise Portfolio Management can help organizations.
- IBM Flash Webcast: Optimizing your Datacenter for Efficient Storage & ROI Register for this webcast to learn the benefits of flash storage from IBM Customer, Leonardo Irastorza of Royal Caribbean Cruise Ltd and Storage... All Data Storage White Papers | Webcasts