Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:30 AM

Tech Insight: Keeping Your Thumb on Thumb Drives

Those little USB drives certainly are handy, but how do you keep your company's sensitive data from walking away? Here are a few ideas

Every time it begins to seem safe to read the news again, there’s a new security breach report: Another company is reporting the potential exposure of customers' personal data as a result of the loss or theft of a laptop, backup tape, or external drive. You'd think all these reports would teach companies a lesson, but it’s apparent that most companies must learn that lesson firsthand -- by experiencing it themselves.

While laptop thefts are reported nearly every day, it's unusual to hear about the loss of portable USB storage devices (thumb drives). Is that because enterprises have learned to secure them properly? Or is it because thumb drives are nearly impossible to track, and most companies have no idea when they have been lost or stolen?

There's no easy way to answer that question, but it is worth noting that there are technologies, both hardware and software, which are helping enterprises to secure data stored on thumb drives. These technologies differ in effectiveness and transparency to the user, but in the end, securing data at rest on thumb drives isn't rocket science -- and it can be done on an enterprise level or in an ad hoc fashion.

Thumb drive manufacturers have been including “security” software on their products for a couple of years, but the functionality has been limited, and typically only provides basic encryption of files stored on the device. Last year, we saw more sophisticated thumb drives that perform file encryption at the hardware level -- such as the eye-catching IronKey -- but the cross-platform functionality and read/write speeds vary greatly, as we saw in the recent reviews from Information Week. Only a few thumb drives offer enterprise-level management features.

Some organizations are attempting to secure their data by completely disallowing all thumb drives, but that isn't a decision that many organizations are ready to make -- there are many legitimate uses for these little babies. The real question is how to secure the data that the users place on the drives -- not how to prevent data from being written to the drive.

One solution is to take a hybrid approach, using a software product that only allows usage of thumb drives with pre-defined serial numbers in conjunction with an IronKey to handle the encryption. Some antivirus suites, like Symantec's Endpoint Protection (SEP) 11, already offer this type of capability. Pair that control with company-issued IronKeys (or a similar product), and you can almost eliminate the panic that's caused by the accidental exposure of these devices (provided the user didn't write the password on the device).

One disadvantage of the IronKey products: They aren't cheap. If your users are prone to losing thumb drives, a smarter investment might be to purchase cheaper thumb drives and rely on a software-only solution to handle the security. Lumension Security Sanctuary Device Control and Credant Mobile Guardian for External Media are two solutions that can transparently encrypt data that is copied to thumb drives -- without any special hardware or interaction from the user.

If you're on a very tight budget -- and if you have a high level of trust in your users and don’t need an enterprise solution -- cheap thumb drives and the open-source TrueCrypt technology could be the way to go. Once you've trained your users and done the initial setup, the data stored in encrypted TrueCrypt volumes on the thumbdrives would be secure -- and you've got a solution that works equally well for Windows, Linux, and Mac OS X.

Each of these approaches has its own pros and cons, depending on the level of user interaction you need, the hardware and software costs you can afford, and the centralized management capabilities you require. As with most security solutions, when it comes to protecting sensitive information from accidental disclosure, there definitely is no "one size fits all."

If you aren't doing any of these approaches, though, take a closer look at all of them and make a move soon. It's a lot cheaper to implement portable drive security than it is to notify thousands of customers that their data has been breached.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Credant Technologies
  • IronKey Inc.
  • Lumension Security
  • Symantec Corp. (Nasdaq: SYMC)

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    FluBot Malware's Rapid Spread May Soon Hit US Phones
    Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
    7 Modern-Day Cybersecurity Realities
    Steve Zurier, Contributing Writer,  4/30/2021
    How to Secure Employees' Home Wi-Fi Networks
    Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-05-07
    U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files.
    PUBLISHED: 2021-05-07
    U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.
    PUBLISHED: 2021-05-07
    The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
    PUBLISHED: 2021-05-07
    Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization.
    PUBLISHED: 2021-05-07
    A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.