ac5140215f6e7ecb90de53eb2cba810d

Added Layer to USB Security Protocol

We always hear the horror story of someone picking up a USB off the street, plugging it into a company computer and the device is infected with some sort of virus or unleashes a program that allows hackers to gain sensitive information from the company.

Stringent protocol can help stop this sort of disaster from happening. A part of protocol that would be helpful is if companies would purchase logo or custom USB’s and those logo or custom USB’s would be the only USB’s acceptable within the organization.

A good strategy might be that certain custom models were only to be used and stored within the organization’s building or buildings. It might be that the organization might have different custom models for different buildings on their campus. Along the same line it could be prudent for the company to issue a custom USB for each employee to take home. These USB’s would be the only accepted USB to use with any company equipment.

USB’s shouldn’t be the enemy in a company’s IT security. Well thought out plans that use custom USB’s would allow personnel to use the tools they have become accustomed.