USB Disk Security Explained
The types of USB storage isn’t restricted to just one (USB drive) but it ranges to other products as well like flash drives, external drives etc. in addition, the USB port lets you connect devices like a mouse, a keyboard, audio headsets, network adapters, gaming controllers etc. Hence, USB drives and USB ports, both are a thing of beauty.
Why USB disk security is important?
The basic two methods a USB drive can harm you is either when someone uses this tool against you or when you get your device infected by not being careful. Both of these circumstances happen due to the freedom thinking ability of not identifying the threats of the modern age.
USB drives not restricted to work purposes only:
In many cases, offices face an issue where they trust on their employees too much. It happens when the systems of your PC aren’t protected or you haven’t kept a password protected usb drive and hence end up losing a big pile of data/file as a consequence. Hence, instead of work, your employees might be involved in something they shouldn’t be involved in. the best you could do is make sure your systems aren’t open to such threats and security and monitoring is properly maintained.
If you use USB drives quite frequently, you must have noticed how easily your device gets filled with unwanted attention (i.e. viruses, Trojans, malwares etc.). It happens mostly without your prior permission especially when you insert your USB drive into a public PC or a device you don’t frequently use. Hence, a clean USB becomes infected and sometimes even makes you regret that decision (of using that infected PC).
How can an infected firmware kill your data?
If your USB disk or drive is infected, it could mean you landing in terrible situations in literal words. For example, a malware infected drive (yours) once inserted into your system can take the control from you. In many cases, a USB drive has been observed functioning as a USB keyboard in charge. When you connect, it sends orders to the keyboard just as if someone is sitting in front of the computer and sending messages to it. As worse as it could get, the keyboard shortcuts can easily be opened within mere few seconds and a Command Prompt Window can be run, a program can be downloaded from the remote server and what not.
What can you do to prevent any such thing from happening?
In short, not much. Know why? Because not matter how careful you pretend to be, there would come a time when you insert your drive into a system (infected) not knowingly or sometimes by your sole authority. For example, a student while preparing a presentation wouldn’t even think of cleaning the system in his/her library and would just want to get done with it.
But what you can do or what is actually in your control is to use another medium of storage. Heard of cloud storage? Exactly. It is another form of storage option that lets you get rid of all the worries even of running out of space. What more can you ask for? Also if you are concerned more about the uninvited usb or flash drives getting attached to your pc, you can simply prevent the data or privacy leaks by limiting the access to authorized usb and flash drives only.
Cloud storage ups and downs:
Merits: space, convenience, easy to use and readily available
Drawbacks: your data in the hands of third party