IT departments of companies try hard to make their database protected against much anticipated attacks from hackers. They equip their system with reliable antivirus and anti-malware programs and remain alert for any kind of attack from cyber criminals. Traditionally, IT experts allocate much of their time to secure their data from cyber criminals. However, they fail to prepare for unanticipated threats, such as portable USB flash drives which can potentially lead to data theft from within an organization. To avoid data breaches from these mobile data storing devices, the experts still rely on orthodox methods. Consequently, portable data security is a crucial point where IT experts commit a small mistake yet end up suffering a big loss.
IT experts have developed a specific technical jargon for portable data security. For example: security of the data at the user end is referred to as end point. The data security professionals have divided the data in several categories such as, data at rest (data saved in drive stationary) and data in use (data that is being transitioned throughout the system). Moreover, the data in use also includes the flow in and flow out of the data through USB flash drives and other portable data storing devices. The information that is in motion is at the risk of being breached.
Different IT professionals suggest that in order to make their companies’ data secure, the underlying focus should be on malware, infectious programs, and data loss. They may seem to be three different enormous problems, but, the roots of these problems can be the same. The reason for these troubles could be related to the casual use of USB flash drives (plugging and pulling out the USB memory stick without due care). Not surprisingly, the USB jump drives are surely one of the biggest sources of data loss/theft. Since USB memory sticks are so small in size, it is quite difficult to take proper care of them. These small data storing devices are very much prone to getting lost or stolen, to prove this point, a comprehensive study conducted by the Ponemon Institute on portable devices revealed the following facts:
• About 70 percent of the businesses have found out that some confidential information is being lost through of USB flash drives.
• 75 percent of the research respondents declined to pay any premium for the security of the thumb drive.
• Almost 74 percent of the respondents confirmed that they did not have any sort of data leakage prevention software on the lost portable drive
As these small portable data storing devices are involved in leaking data, using security software that can secure USB makes good sense. USB flash drives are responsible for spreading more than 75 percent of the infected programs. In a study by the U.S Homeland Security, there were some USB sticks purposely scattered in different parking lots and other such public places with and without company’s logo. The outcome was not much astonishing, revealing that over 60 percent of the USB drives were picked up and plugged into personal computers, what’s more, almost 90 percent of USB jump drives displaying company logos were plugged into the personal computers. The study revealed that company related information is more valuable to the average data thief as compared to your personal information.
Powered by NewSoftwares.net