An IT Manager's Insight Into Securing Removable Media
by Magnus Ahlberg - Managing Director of Pointsec Mobile Technologies - Tuesday, 9 November 2004.
Step Two – Education - Inform your employees about security and its implications. Explain why certain controls have to be put in place. Don’t just impose those controls or users will ignore them.

Step Three – Encryption - Consider employing a mobile data protection product. Mandatory media encryption solutions are available that can be centrally controlled by the IT department. The best products are fast and transparent to the user, so as to not interfere with their real-time work. Such protection automatically encrypts all information loaded onto a USB token or other removable media. Access is granted only to the user who holds the password.

Step Four – Control - Implement device and executable control solutions that enable you to control exactly what devices can be connected to a system and what executable files can and cannot be run.

Step Five – Audit and Measure - Ensure that you carry out regular audits to find out who is using removable media.

In today’s complex digital world, nothing about security can be guaranteed. But by following these few simple steps, you can mitigate your risk and show that you have taken adequate steps to do everything you can to protect the information that is being carried around on removable media devices. Once you do, you’ll be able to sleep at night, safe in the knowledge that your company is not the next in line for public humiliation in the tabloids for allowing a leak of valuable information.

Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //