The Risks of Using Portable Devices

436 KB | 3 files |  PDF

Organizations should follow these best practices for managing all types of portable devices.

Portable devices like jump drives, personal audio players and tablets give users convenient access to business and personal data on the go. As their use increases, however, so do the associated risks. The properties that make these devices portable and enable them to have on-the-fly connection to various networks and hosts also make them vulnerable to losses of physical control and network security breaches. Using portable devices can increase the risk of data loss (when a physical device is lost) data exposure (when sensitive data is exposed to the public or a third party without consent), and increased exposure to network-based attacks to and from any system the device is connected to (both directly and via networks over the Internet).

This paper focuses on two subsets of portable devices:

  • Simple media devices that require a wired connection to transfer data
  • Smart media devices that can transfer data with a wired or non-cellular wireless connection

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Risks of Using Portable Devices.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ...  More >>

Money3 PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ...  More >>

Cryptographic Key Management Issues & Challenges in Cloud Services

The management of cryptographic keys is a critical and challenging security management function, especially in the case of a cloud environment. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.