Sunday, September 21, 2014
Home > Others > Pen Drive Security Issues

Pen Drive Security Issues

Pen drive is a familiar, portable computer gadget which gained popularity for its data storage and recovery functionality. Identical to various other products and gadgets, it also has its downside that cannot be ignored, as it poses the threat of virus transmission, sometimes making it difficult to be detected by anti-virus software. Also, this handy device may be responsible for data theft, as restricting its usage in corporate environments is difficult.

The advantage of being small in size helps in carrying it stealthily and this is topped with the benefit of acquiring it for a low price. These days, pen drives get through metal detectors very safely and hence the threat towards information security becomes a tough task. The greater the number of tech-savvies running for improved technology, the higher is the threat and dangers exposed in association to the new technology, and pen drive is no exception. Owing to these hazards, taking some challenging measures helps in dealing the issue.

Locking desktop: Earlier, emails or floppy drives were the key sources of virus, but these could be eradicated without much effort. Now even with the improvements in technology, detecting pen drive transmitted virus sometimes is difficult. Hence, adopting the locking desktop security policy is recommended as the computer gets automatically locked when it is not in use even for few minutes. This can be made more secure by minimizing the locking interval so that misuse of pen drive can be averted to a very great extent.

Offering training: Pen drive is available at less expensive costs and this has lured all the gadget junkies to have one as an indispensable part of their regular things. And since the usage of it has become highly essential in today`s work, a proper training or crash course about how to make the right use of it has become essential. This training might even help the users understand the hazards of transferring virus or stealing important information.

Limited USB Ports: The USB ports should be made disabled so that there is a check on the pen drive being used by outsiders. The USB ports should be made available only to authorized staff workers. Besides, there is software available to limit the access of these devices such that there should be a strict vigilance.

Accurate policies for anti-virus: The anti-virus software that is configured should be capable enough to detect and scan every removable and attached drive or media. Training every interface user to scan files prior to opening them helps in reducing the virus effect even if gets transmitted from a pen drive.

Employing secure devices: The corporate or company should be meticulous in issuing the employees secure devices such as pen drive and they should approve the purchase of such devices. Potential access may be given to users, but it must be followed with complete security features and they must be adeptly trained to employ all the secure devices and features.

Security personnel: Training the security personnel is a must so that they know how it looks and comprehend the hazards of pen drive. This will keep them aware to restrict any illegal or unofficial person entering or leaving the company with a pen drive.

The fact cannot be ignored that it is hard to work without the assistance of a pen drive in any corporate environment, but facing constant threats should certainly be checked by following the measures mentioned above.

Get Weekly Email Updates

Signup and receive an email once a week with new and interesting content

I will never give away, trade or sell your email address. You can unsubscribe at any time.

About Ajithkumar

I am Ajithkumar, an entrepreneur and a karma yogi. I live by the principle: "Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do". So I do all the things I like with a willingness to accept responsibility for my actions. Connect with me on Google+
Copy Protected by Chetans WP-Copyprotect.