7 steps to escort your USB storage device

Source: Internet
Author: User
Keywords Security malicious code
Personal storage devices like USB Flash are now very powerful, and they are common in a wide variety of businesses. These devices were originally used as consumer-grade applications, so there was a general lack of security, control, and ancillary management tools. Many employees take their work home or out of the workplace without thinking about the rudimentary storage equipment they bought from their local office supplies center. Millions of people carry personal storage devices, so these innocent gadgets are used to increase the impact of malicious attacks and other illegal attempts, such as stealing information from businesses. Even if people use these devices carefully, the data stored on the USB hard drive is not included in some of the company's regular procedures, such as backup, encryption, or asset management. So how can you track data that goes through the company through these devices? In this case, securing the company's data is a great challenge for any company's IT department. Recent events in the industry have aroused concern recently, leading IT experts to recognize the need to use new policies and technologies to protect information stored in personal storage devices. Here are some things that happen to people who take the message home: a professor at the University of Kentucky found his flash memory stolen, and the privacy information of his former 6,500 students was in jeopardy. These include student names, age and personal social security codes that will cause thousands of of people to be in the threat of identity theft, not to mention their violated privacy. A flash drive with confidential military information was sold at a market outside Bagram, Afghanistan. The Americans realized that they had to secure the data on the USB hard drive, find ways to track the devices, and ensure that important information was not accessed by unauthorized employees. Security Tips If employees store information about their company on unprotected personal storage devices, they put the company at risk as soon as they go out. The audit company faces the risk of leaking billing information, and if the patient's information falls into the wrong hands, the hospital suffers and the finance company also needs to ensure that the confidential data is not lost. Once company data falls into the wrong hands, there is no doubt that the company will face great risks and threats. Companies lose credibility, get involved in litigation, and cause employees to be stolen or cheated by identity information--a series of problems. The risk of personal storage devices can be divided into the following points: data leakage due to loss or theft of equipment, unauthorized data extraction introduction of malicious code enterprise focus on vulnerabilities in USB devices There are millions of USB storage devices in the market, and confidential corporate data is flowing around--at the same time, the risk of being lost or stolen. The potential losses caused by sensitive corporate data loss are exponentially increasing every day, and this situation is increasing the need to adopt appropriate security measures for mobile storage devices. The following are some of the major security issues associated with mobile storage devices: Data leaks-In order to minimize the risk of data leakage, an enterprise should limit its employees to using only the company's approved USB devices. Rules and regulations-all organizations should ensure that they follow government and security rules-such as Sox, HIPAA, GLB, California SB, and fisma---to reduce the likelihood of data loss. First, they need to establish a clear security policy, advertise the strategy to employees, and enforce these policies by using monitoring, tracking, and backing up all the technologies on the mobile device. Data loss and technical support overhead-despite the adoption of several measures, the company's data could be lost or stolen, causing businesses to work to reduce losses. Providing a company-approved USB device allows companies to take the initiative to recover lost data and reduce loss activity. What can a viable solution do to strengthen its security for personal storage devices? People use many kinds of hardware and software solutions, from data encryption to authentication, anti-virus software, and other monitoring options. Indeed, there are several solutions, such as closed ports, encryption of storage devices, and software encryption of data, but none of these solutions address critical issues: No comprehensive security solution is available for most removable devices. 7 Steps to protect your personal storage devices These steps will help your company secure your personal storage device, whether it is in the network or not. 1. Always define and publish company policies on personal storage devices. 2. The company issued personal storage equipment. 3. Make sure those devices are fully encrypted. 4. Ensure that users are unable to avoid security measures. 5. Maintain the monitoring of the data stored on the device. 6. Ability to repair data on personal storage devices. 7. Ensure that the company's solution is comprehensive enough that it enables you to store data on a secure USB hard drive, control all removable devices in the company's internal and external environments, and centralize the management of company-issued USB devices. In today's shopping malls, the value of mobile storage devices can be said to be self-evident. It is also clear that companies should proactively integrate these devices into their storage and security policies. Take appropriate measures, including the choice of technologies that protect and monitor data at the same time, and provide strong data protection policies that comply with regulations, ensure that employees are using the storage devices provided by the enterprise, and so on, so that businesses can secure their data. M-systems will be shown in InfoSecurity Europe 2007, the top European focus on information security, to be held in London in April 2007 24-26th. Responsible Editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passed (0 Votes) Original: 7Steps to escort your USB storage device back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.