More

    Ten USB Drive Security Best Practices

    Sponsored by Kingston Technology, the Ponemon Institute recently released the results of "The State of USB Drive Security." The focus of the research was to better understand how complex business and government organizations manage the security and privacy requirements of data collected and retained on USB drives.

    According to the Ponemon Institute, the lesson to be learned from the research is that organizations do understand they are at risk because of employees’ negligence, but are not taking the necessary steps to secure USB drives. The main reasons cited for not being proactive include: uncertainty about monitoring and tracking USB use in the workplace, desire not to diminish productivity and the reliance on employee integrity and trustworthiness.

    The study also revealed that while these devices may be small, the data breaches that can result from lost or stolen USBs are huge. More than 70 percent of respondents in this study said that they are absolutely certain (47 percent) or believe that it was most likely (23 percent) that a data breach had been caused by sensitive or confidential information contained on a missing USB drive. On average, organizations in the study lost more than 12,000 records about customers, consumers and employees as a result of missing USBs.

    This slideshow features 10 USB security practices the Ponemon Institute recommends that all organizations adopt and practice.

    Ten USB Drive Security Best Practices - slide 1

    Click through for 10 USB security best practices identified by the Ponemon Institute and Kingston Technology.

    Ten USB Drive Security Best Practices - slide 2

    Provide employees with approved, quality USB drives for use in the workplace.

    Ten USB Drive Security Best Practices - slide 3

    Create policies and training programs that define acceptable and unacceptable uses of USB drives.

    Ten USB Drive Security Best Practices - slide 4

    Make sure employees who have access to sensitive and confidential data only use secure USB drives.

    Ten USB Drive Security Best Practices - slide 5

    Determine USB drive reliability and integrity before purchasing by confirming compliance with leading security standards and ensuring that there is no malicious code on these tools.

    Ten USB Drive Security Best Practices - slide 6

    Deploy encryption for data stored on the USB drive.

    Ten USB Drive Security Best Practices - slide 7

    Monitor and track USB drives as part of asset management procedures.

    Ten USB Drive Security Best Practices - slide 8

    Scan devices for virus or malware infections.

    Ten USB Drive Security Best Practices - slide 9

    Use passwords or locks.

    Ten USB Drive Security Best Practices - slide 10

    Encrypt sensitive data on USB drives.

    Ten USB Drive Security Best Practices - slide 11

    Have procedures in place to recover lost USB drives.

    Latest Articles