“Our technological powers increase, but the side effects and potential hazards also escalate.”
                      -Alvin Toffler, American writer and futurist
Download your free e-book: 10 endpoint security management predictions for 2021
Technology has seen some drastic developments in the last few decades. From CRT to LED monitors, Microsoft Paint to Google Tilt Brush, and floppy disks to flash drives, everything has changed with respect to size, quality, and performance. Although these technological developments offer improvements, they also bring new threats along with them.
The universal serial bus (USB) was invented to replace the various connectors at the back of PCs, address the usability issues of existing interfaces, and streamline device software configurations. USB also enabled higher transfer rates for external devices. From the first USB released in 1994, to USB 3.1 released in 2013, this technology has seen massive change in regard to performance and storage. However, as USB devices—particularly flash drives—have evolved, so have the threats and risks they carry with them.
 1. Disgruntled employees can easily steal data using USB drives.
When a USB or any other portable device is used in an unsupervised way on your network, it can lead to data theft or the introduction of viruses. As a cheap, easy way to transfer files or back up data, organisations often overlook the threats posed by USB drives. A single flash drive can collapse an entire network if managed improperly.
Unlike email or other online services that enterprises audit, USB devices are essentially a blind spot for businesses. Disgruntled employees can exploit this blind spot by transferring confidential information to a USB drive when they leave, including client databases, emails, calendar appointments, and contact lists. They can then distribute this information as they please, and even give it to competitors.Â
Organisations can employ a USB security management system to set restrictions on USB devices in their network. USB security systems help organisations avoid unnecessary data theft, while also protecting against malware introduced by employees’ devices.
 2. USB drives aren’t always used for work purposes.
Data theft isn’t the only threat to enterprises. Lost productivity is a huge issue, too. Employees might work on hobby-related tasks during business hours. That’s why a USB security system that monitors user machines, and can tell you who is accessing a USB port from what computer and when, is crucial in any enterprise. See which files employees are transferring to and from their work computer to identify non-work activities.
 3. Booby-trapped USB drives can destroy your network.
Did you know hackers can control your keyboard without your knowledge? There are USB drives, nicknamed booby-trapped USBs, that are capable of controlling users’ computers without permission.
In 2015, hackers developed a USB pen drive that can deliver a 220 volt charge to a computer, destroying it instantly. Just a few years earlier in 2010, the infamous Stuxnet worm infected Iranian nuclear facilities decreasing efficiency by 30 percent. Named the most sophisticated computer virus ever created, the Stuxnet worm is believed to have originated from a worker’s USB drive. Once this worm infects a USB drive, it attacks that drive first,, then quickly moves toward other computing systems.
Booby-trapped USBs are dangerous because users are unaware of the damage being inflicted. Even with a proper network management system, threats like these can slip through the cracks. So a secured network is not just about deploying a network management system, it’s about deploying a complete desktop management solution that can also take care of USB security.
 4. Unidentified devices can wreak havoc in your organisation.
The utility and ubiquity of USB devices means that they can’t be banned from organisations outright, so organisations need to implement a system that allows these devices while also protecting their business. To secure these devices, you must first have a database that contains information about all the portable storage devices in your corporate network. Once you’ve done that, you can schedule periodic scans to monitor how the USB devices are being used.
 5. Encrypting USB drives isn’t enough to effectively secure them.
In extreme cases, organisations have to limit USB device use to specific employees or restrict access to USB ports. Organization’s can encrypt USB drives or disable AutoRun, so programs on a USB drive don’t run automatically when the drive is inserted; however, these strategies aren’t enough. Limiting the use of devices based on workgroups and domain membership can also help you avoid USB threats and keep your organisation secure.
 6. The ability to block and unblock USB devices improves USB security.
An enterprise can avoid the above threats by controlling all the USB devices in its network. Controlling USB devices is as simple as blocking and unblocking them according to your needs.
Desktop Central allows you to block and unblock USB devices even after they have been added to your corporate network. Restrict these devices based on a target group or domain for more granular control over device access. Disable all USB access except for basic devices like keyboards, or authenticate USB devices just using the device instance IDs. Use Desktop Central to manage access for printers, CD-ROMs, portable devices, Bluetooth devices, modems, and other similar peripherals as well.
Watch this video to learn how Desktop Central can help you overcome USB threats.
Desktop Central also comes with features for patch management, software management, asset management, remote desktop management, enterprise-specific configurations, and more. And Desktop Central isn’t just efficient—it’s cost-effective too. Whether you’re securing USB devices or managing your entire network, Desktop Central makes it simple.
Download Desktop Central now and start experiencing the benefits for yourself.
cool info on custom usbs
Great information. Lucky me I discovered your site by accident (stumbleupon).
I’ve bookmarked it for later!
I just ran across your article. I work in the filed of blocking not only open USB ports, but also other data ports such as RJ-45, serial, SD, etc. In our line of work, we are contacted by customers every day who have fallen victim to breaches caused by open data ports – most commonly USB. IT managers often feel protected by methods such as device whitelisting, and other similar methods of preventing USB devices from connecting. While these methods are effective, we have to remember that all methods can be circumvented. Having as many stumbling blocks as possible in place will increase the chances of preventing a breach. Simply locking down the port is a simple method that offers a certain degree of protection and does not require an IT person to install. It is an important first step all organizations should take.
USB devices could be very harmful, if not properly monitored and restricted they could reck havoc. In addition to blocking ports, with our new in-house product Device Control Plus, you can now manage and control what data should be transfered to and fro a USB device. Complete details at DeviceControlPlus.com