The U.S. Department of Defense has quietly eliminated removable USB drives from technologies acceptable for use in government computers. While it's being reported that a virus prompted the prohibition, the ban is a reminder of just how convenient easily compromised technologies have become.
The U.S. Department of Defense has quietly eliminated removable USB drives from technologies acceptable for use in government computers. While it's being reported that a virus prompted the prohibition, the ban is a reminder of just how convenient easily compromised technologies have become.The DoD ban of USB memory devices extends to thumb drives, memory sticks and cards, as well as camera flash cards.
Admitting that a virus had struck DoD networks, the government began confiscating government-issued USB drives and sending unequivocal orders that use of personal devices was absolutely prohibited.
The Defense Department has been reticent about releasing too many details regarding the situation, which is to be expected, but begs the question of how effective its anti-malware and device monitoring systems were in the first place.
That said, the salient point here, and the one most crucial to small and midsized businesses is the establishment of a policy regarding use of personal devices.
Even with effective and up-to-date anti-malware and device monitoring tools in place, you need to think hard about just what your employees will -- and more importantly will not -- be allowed to connect to your networks.
Without such hard, careful thought, translated into a firm and firmly enforced policy, you run the risk of being put in the same sort of reactive that the DoD is in, which is not where you want to be.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024