Security News > 2020 > July > USB storage devices: Convenient security nightmares
Such techniques and practices form a key part of endpoint security and help protect both computer systems and sensitive data assets from loss, as well as security threats that can be deployed via physical plug-in USB devices.
The most authoritarian approach is to block the use of USB devices altogether, either by physically covering endpoint USB ports or by disabling USB adapters throughout the operating system.
This could either be one that only permits employees to use certain "Authenticated" USB devices - whose file systems have been manually encrypted - or stipulating that individual files must be encrypted before they can be transferred to a USB storage device.
With the help of USB control applications, admins can use this information to limit or block certain types of USB devices on specific endpoint ports.
While portable USB drives and devices are seen as a quick, convenient way to transport or store data by employees, they often present a major headache for security professionals.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/3FIClcbxR5g/