Is the Oldsmar Water Breach a Cybersecurity Omen?
With the work-from-home movement inspired by a global pandemic, remote access is becoming even more necessary, and the cybersecurity risks are escalating proportionately.
Jeff Clark2021-02-14T14:04:09-05:00March 3rd, 2021|Categories: Flash Drive Breaches|
With the work-from-home movement inspired by a global pandemic, remote access is becoming even more necessary, and the cybersecurity risks are escalating proportionately.
Jeff Clark2020-12-13T08:25:06-05:00January 20th, 2021|Categories: Flash Drive Breaches|
The properties that make USB flash drives portable and enable them to connect to networks also make them vulnerable to security breaches.
Jeff Clark2020-10-10T11:44:28-04:00November 4th, 2020|Categories: Cybersecurity, Flash Drive Breaches|
With the ease of data transportability provided by a USB flash drive comes the ease with which a data breach can occur. Are you at risk?
Jeff Clark2020-08-20T10:56:52-04:00September 2nd, 2020|Categories: Cybersecurity, Flash Drive Breaches, Port Locks|
In this new work-from-home era created by a global pandemic, the cybersecurity dangers associated with portable media are growing exponentially.
Jeff Clark2020-08-20T10:56:52-04:00August 5th, 2020|Categories: Flash Drive Breaches|
Data breaches related to USB drives and other peripheral devices are on the rise. In fact, insider threats are one of the leading cause of data breaches.
Jeff Clark2020-08-20T10:56:53-04:00May 6th, 2020|Categories: Flash Drive Breaches, Port Locks|
Without effective USB port security, every USB port in your data network or information system is an open invitation to malware, ransomware, and viruses.
Jeff Clark2020-08-20T10:56:53-04:00January 1st, 2020|Categories: Cybersecurity, Data Breach, Flash Drive Breaches|
Widespread are the daily breaches in which authorized personnel thoughtlessly charge or sync their personal mobile device through a USB port at work.
Jeff Clark2020-08-20T10:56:53-04:00November 6th, 2019|Categories: Flash Drive Breaches|
The mystery of cyber warfare is that many of the most impactful attacks came not through the Web or the cloud, but rather through the humble thumb drive.
Jeff Clark2020-08-20T10:56:53-04:00October 16th, 2019|Categories: Flash Drive Breaches, Port Locks|
Chilling research has demonstrated that even the best-intentioned workers don’t hesitate to connect personal devices to the data system at work.