Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Without Protection, Your USB Ports Could Become RIP Ports

Without Protection, Your USB Ports Could Become RIP Ports

It seems like everything available today can function with a USB connection, be it a thumb drive, device charger, or a desktop device--there are even USB-powered mini fridges meant for a single soda can. Unfortunately, “everything” includes malicious devices and malware.

If a USB drive is infected by malware, you can put your computer and data at risk by merely plugging it in, and there are some malicious USB devices out there that pose some pretty serious threats.

USB Kill 2.0 
Despite being powered by electricity, computers don’t mix well with too much charge, as USBKill.com has capitalized on. Creating a dongle that is capable of siphoning power off of the device it is plugged into, USBKill.com’s proprietary device then releases the energy back into the system as a power surge attack.

Intended for hardware developers to test their devices’ resistances against ‘juice jacking' (a form of data theft that extracts data as a device is charging), the USB Kill 2.0 permanently damaged--if not destroyed--95% of all devices it was tested with without the company’s proprietary USB protection shield. This shield is what allows the USB Kill 2.0 to be safely used for its intended purpose--to test electrical attack resistance.

What’s more, in some cases when used without the shield, the USB Kill 2.0 wipes data from the device. While this is not what the USB Kill 2.0 is intended to do, this occurs simply because the charge is enough to damage the device’s drive controllers.

Needless to say, a business saboteur could find great use in the $56 USB Kill 2.0 as a method of attack, and there aren’t many effective protections a workplace can implement, besides educating employees to resist the temptation of plugging in any USB device they find.

USB-to-Ethernet Theft
Best practices for workstation security dictate that a system be locked whenever its user steps away, no matter how briefly. However, a security researcher recently discovered a method of extracting data from a locked computer using, you guessed it, a USB-connected device. By disguising itself in a particular way, the target computer adopts the device as the preferred network interface, allowing the hacker to extract data to a rogue computer attached to the cable’s other end in about 13 seconds. The best defense, according to the researcher who uncovered this flaw: don’t leave your workstation logged in and unattended, even with the screen locked.

What a Business Can Do to Protect Itself
Of course, not all USBs are evil carriers of the worst malwares and threats, but by no means should they be used after being found on the street willy-nilly, especially in a workplace setting. In order to protect business workstations and data from threats, simply enforce a requirement to have any USBs fully checked by your IT department before in-office use. Alternatively, consider utilizing a cloud solution as a much safer option to meet your mobile storage needs.

To protect your business from possible saboteurs introducing their USB-based malware, it is also wise to secure exposed ports with locking devices.

While USB devices seem to be the pinnacle of affordable convenience in data storage, they are far more trouble than they are worth, at least in terms of security. There are much safer solutions to implement that feature equal, if not greater mobility than even a flash drive. A cloud solution, for instance, can be accessed from anywhere there is an Internet connection, kept safe in a well-protected, offsite location. New and improved solutions like these make risk-laden devices, such as USB dongles, unnecessary.

For more IT tips, tricks, and solutions, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Virtualization Saving Money Holiday Tech Term Gadgets Social Media Microsoft Office Managed Service Managed IT Services Automation Artificial Intelligence Cybercrime Computers Facebook Operating System Hacking Wi-Fi Health BYOD Mobile Device Management Networking Internet of Things IT Support Covid-19 Spam Information Office 365 Telephone Systems Information Technology Managed Service Provider Remote Alert Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Data Breach Human Resources Password Money Encryption Mobile Computing Remote Monitoring Applications Application App Law Enforcement History Big Data Apps Blockchain Remote Computing Paperless Office Mobile Office How To Government Office Tips Data Storage Training Patch Management Private Cloud VPN Managed IT Bring Your Own Device Data Management Work/Life Balance Servers Two-factor Authentication Flexibility Marketing Mouse WiFi Data Security HaaS IT solutions Google Drive Entertainment Website Budget Infrastructure Voice over Internet Protocol Avoiding Downtime Wireless Vulnerability Gmail Windows 7 Word Settings Firewall Cleaning Vendor Management Vendor Virtual Reality Apple Managed Services Display End of Support Staff Software as a Service Social Telephone System Education Physical Security Machine Learning Safety User Error Connectivity Employee/Employer Relationship Remote Work Meetings HIPAA Sports RMM Redundancy USB Keyboard Risk Management Hacker The Internet of Things Conferencing Lithium-ion battery Data Protection Scam Save Time CES Botnet IT Plan Fax Server Computing Infrastructure Managed Services Provider Content Management Going Green Virus Business Technology Access Control Unsupported Software SaaS Unified Threat Management Database Computer Accessories Charger Virtual Assistant Battery Remote Workers Authentication Compliance Network Congestion Shadow IT Processor OneNote Computer Care eWaste Legal Current Events Telephony Internet Exlporer Hard Drive Printer Update Samsung Bluetooth PDF Google Docs Value Wearable Technology Hard Drives Computing Identity Theft Retail Electronic Medical Records Instant Messaging Spam Blocking Proactive IT Robot Excel IT Consultant Best Practice YouTube Hiring/Firing Biometrics Black Market Virtual Desktop Augmented Reality Digital Signage Humor Fraud Remote Worker DDoS Document Management Wireless Technology SharePoint Cryptocurrency Solid State Drive How to Procurement Business Intelligence Downtime Workplace Strategy Net Neutrality Audit Worker IT Management Data storage Help Desk Comparison Customer Service Environment Automobile Printing ROI Computer Fan Rootkit Antivirus Video Conferencing File Sharing Sales Camera Windows 8 Bitcoin Inventory Monitor Shortcuts Specifications Benefits IT service Point of Sale Personal Wire Cryptomining Evernote Workers FENG Travel Supply Chain Management Monitoring Printers Tablet Batteries User Reputation PowerPoint Millennials IBM Streaming Media Windows Media Player Smart Technology Domains Windows 8.1 Content Digitize Smart Office Flash Wireless Charging Tech Support Windows Server 2008 R2 Laptop Techology Customer relationships Virtual Private Network Managing Stress Software Tips Customers Workforce Supercomputer IaaS Maintenance Email Best Practices Bloatware Audiobook IT Assessment Sync Manufacturing Cables Emails Touchpad Cameras Computer Tips Project Management Tablets Managed IT Service Nanotechnology Security Cameras Telecommuting Two Factor Authentication Virtual CIO Entrepreneur Politics OneDrive Advertising Biometric Security Cortana Netflix Digital Signature Root Cause Analysis Peripheral Digital Security Cameras Warranty Using Data HBO Knowledge Notifications Music Shortcut Cost Management Copiers HVAC Skype 5G Google Apps Analysis Data loss Printer Server Social Networking Quick Tip Ergonomics Administrator Devices Outlook Relocation Smartwatch Leadership Troubleshooting Development Enterprise Content Management Start Menu OLED Video Games Virtual Machine Accountants Screen Mirroring Loyalty Running Cable PCI DSS MSP 2FA Microchip Memory Worker Commute Fiber Optics Thought Leadership Frequently Asked Questions Employee Credit Cards Books Experience Messaging Password Management Mobile Cabling Password Manager Windows 10s Scalability Hypervisor Cast Multi-Factor Security Policy Dark mode Search Engine Business Owner Trend Micro Twitter Tip of the week webinar Emergency Public Cloud NarrowBand Employer Employee Relationship SMS NIST Professional Services Default App Business Mangement Science Search Saving Time Smart Tech Trending Assessment Procedure dark theme Shopping Addiction Windows Server 2008 iPhone Google Search Amazon Recycling AI Tools IT Infrastructure Consultant Wiring Practices Bing Analytics Television Distributed Denial of Service Customer Relationship Management FinTech Analyitcs Social Network Cache Files Amazon Web Services Best Available Criminal Chromecast Programming Safe Mode Investment Employees GDPR Employee/Employer Relationships WIndows 7 Hosted Computing Public Computer Transportation Windows 365 Wireless Internet Regulations Colocation ISP Online Shopping Uninterrupted Power Supply

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code