Employees Don’t Take USB Security Seriously

USB Device Security

USB devices continue to be an entry point for cybercriminals that are looking for ways to access your data with lack of USB device security procedures. USB devices can be used to infect a machine with malware, trojans, or ransomware. According to secure-hardware vendor Apricorn’s The State of USB Data Protection 2019 report, USB devices remain a feasible target for cybercriminals.

According to the report, 87% of organizations use USB devices, and 68% of that stated employee choice was the reason. While nearly two-thirds of organizations have satisfactory policies around USB devices, 64% say employees use USB devices without prior permission. Fourty-eight percent of employees have lost a USB device and not reported it to IT, and 58% use non-encrypted USB devices obtained from conferences and other sources.

With so much focus on cyber threats coming in via email and the web, organizations often overlook USB devices as a means for an attacker to inject malware into an organization. Users need to be educated on the dangers of USB devices use and the impact an attack can have on the organization. Security awareness training includes education on the need for a security mindset at work as well as on proper USB etiquette.

It is critical to be realistic about your environment and acknowledge that risks exist. Security, while not perfect, can help you be prepared against the financial and reputational cost associated with a breach. We are a firm believer in being proactive about the security measures set for your company. There are two types of companies, those who have been hacked and those who will be.

85% of cyberattacks could have been prevented with the implementation of just a few critical controls. Our Security Awareness Training solutions includes phishing simulation to equip your organziation with the skills to combat an attack. Our security awareness training features a USB Security Test. On average, 45% of your users will plug in USB. Find out how your users will react to unknown USB they find!

Network and Systems Engineering

Reduce cost and mitigate technology risk within your infrastructure.

Show me a better solution.

Security and Compliance

Put Cybersecurity on the agenda before it becomes the agenda.

Layered security solutions.

Network Infrastructure

Harness the power of cloud hosting technology.

Equipment and software solutions.