Mistakes humans make with data – mistake #3: USB flash drive

Mistakes humans make with data – mistake #3: USB flash drive

10 Dec, 2020 2 min read
Nigel Thorpe
Nigel Thorpe
Technical Director
This is Part 3/5 of the "Mistakes humans make with Data" series.

Risk of using USB flash drive

USB media offers a fast, simple way to transport, share and store data when an online transfer isn’t possible or easy. However, their highly accessible and portable nature can at the same time make them a complete business security nightmare with data leakage, theft and loss all too common. Then there is the risk of a malicious USB flash drive infecting a machine and providing a back door into the corporate network.

Just in early November, tax returns contracts and bank statements were among the ‘deleted’ files recovered from USB drives. Cybersecurity researchers from Abertay University discovered in the region of 75,000 files after purchasing 100 of them on an internet auction site.

The growth in remote working appears to have compounded these issues. According to recent research by Digital Guardian, there has been an increase of 123% in the volume of data downloaded to USB media by employees since the start of COVID-19. This suggests many of us have used these devices to take home large volumes of data. That means there are hundreds of terabytes of potentially sensitive, unencrypted corporate data floating around at any given time.

Prevent Data Leaks from USB flash drive

Fortunately, effective implementation of USB control, along with encryption can significantly improve protection against inherent dangers. There are techniques and practises which can be used to secure the access of devices to USB ports. These form a key part of endpoint security, helping to protect both computer systems and sensitive data assets from loss and security threats that can be deployed via physical plug-in devices.

There are many ways USB control and encryption can be implemented. You could block the use of the devices completely, by covering up the endpoint ports, or by disabling their adapters throughout an operating system. However, with the vast number of peripheral devices relying on USB ports to function, including keyboards, chargers, printers and more, this will not work for many businesses.

So, a better solution is to use file encryption software, which protects sensitive data itself, meaning if a flash drive is lost or stolen, its contents still remain safe. This can be done by purchasing devices which have encryption algorithms built into them, or better still making sure all corporate data is encrypted all of the time – when stored, when in transit and when in use. That way, no one has to worry or decide which files must be encrypted before transferring to a USB device.


If you are interested in reading the rest of the "Mistakes humans make with Data" series:

Our website uses cookies to ensure you get the best experience and can find what you need. Read our cookie policy