Blog Posts Tagged with "Flash Drive"


ICS-CERT: Removable Media Flash Drive Attacks

July 10, 2012 Added by:Infosec Island Admin

A shift supervisor was using a portable flash drive for downloading information from an HMI connected to the industrial control systems. Antivirus scanners run on the removable media, the HMI machine, and other systems found the Hamweq virus on the removable media, but the other systems were clean...

Comments  (0)


Cyber Self Defense For Non-Geeks

March 28, 2012 Added by:Jeffrey Carr

These principles won’t be sufficient when you’re in high-risk locales and they won’t stop a targeted attack, but they will make it less likely that you’ll suffer a serious breach because of poor security habits or over-reliance on antivirus or firewall applications...

Comments  (0)


Twelve Security Best Practices for USB Drives

February 07, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)


Remote Management as a Complement to Endpoint Security

October 31, 2011 Added by:Kanguru Solutions

Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...

Comments  (0)


Securing Flash Drives within the Enterprise

September 29, 2011 Added by:Kanguru Solutions

Flash drives have revolutionized the business world with their convenience and portability. However, for infosec professionals, flash drives are a dual edged sword. If lost or stolen, a single unencrypted flash drive has the potential to cause a costly data breach...

Comments  (1)


Customize Your Flash Drive – Infosec Style

September 12, 2011 Added by:Kanguru Solutions

Every organization has different needs. What works for one may not work for another. Size, budget, personnel, and structure all play a factor in determining what an organization will do in terms of IT security. There generally is no “one size fits all” solution when it comes to Infosec...

Comments  (0)