Thursday, 29 November 2012
Online Serveys For Money - Combating the Security Threats Involved With a Pen Drive
A pen drive is the most useful device for the corporate spies or hackers to take data easily and misuse it, while data security and confidentiality matter the most in any government and private organisation. But it has been proved to be the most dangerous device to harm any organisation, is not just a boon for the IT and other business sectors, the high capacity movable storage device of the computer, pen Drives.
Pornography pictures and other inappropriate files violating corporate rules, mP3 files, computer games, video clips, many employees have found with taking malicious software, in corporate sectors. This portable device can be responsible for data loss and data theft. A computer can be easily infected by a virus transmitted through pen drive, as most of the antivirus software fail to detect the viruses in a pen drive or safeguard the computer. The most important is transmission of viruses, among the threats for an organisation associated with a pen drive.
Some measures can be chosen to deal with the serious issue, however. The security threats involved with a pen drive is hard to combat with, hence. The pen drives are available that can not be identified by a metal detectors as well, these days. They are too small in size to be carried stealthily and also they are getting cheaper everyday. Restricting a pen drive in a corporate environment is next to impossible, however.
Educating the user:
But it is possible for the office authorities to educate the users on the use of pen drive while taking data to their home out of the office or bringing any data to the office. Pen drives becomes essential for any work progress, and sometimes. It is hard to stop the gadget junkies from using pen drives as it has become the `must-have` for them.
Lock desktop security:
In a workstation with access to sensitive data the lock desktop can prevent misuse of pen drive to a large extent. The interval of locking can be reduced in a high risk environment. Using a pen drive or misuse of data are possible when the computer is unattended by someone, though it is a perfect alternative. Many companies are adopting the security policy of locking the computer automatically when not in use for a few minutes.
Rigorous anti-virus policies:
This can reduce the effect of the virus in case it is transmitted through a pen drive. The users of every interface should be trained to scan the files before opening them. The company or the corporate authorities should configure antivirus software to scan and detect every attached drive and removable media.
Restriction of USB ports:
Even software can be used to restrict the access of end user to the I/O devices and many other plugs and play devices. The legacy port can be used for using the peripherals, in place of the USB port. In the corporate environment or any other place the USB ports of the desktop computers can be made disabled to prevent the use of pen drive by the outsiders.
Use of secure devices:
The users having potential access to sensitive data should be allowed the devices with security features and they should be trained to use all the security features. Companies should take care of issuing only secure devices to the employees and also these devices should be approved to purchase.
Educating the security personnel:
Legal steps can be taken to seize the device, rather. Any unauthorised person in the company premises with a pen drive should not be ignored. The security personnel of a company must know how a pen drive looks like and what dangers it can cause if it is with a miscreant.
Reduce the hazards of misusing pen drives, at least, some of the above security measures can be adapted to, where the large business sectors are facing potential threats due to pen drives everyday, but looking at the scenario. It is barely possible to work in any corporate environment without the help of a pen drive.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment