Best Practices for Managing and Enforcing USB Security: Five Questions You Should Ask About Universal Serial Bus (USB) Security
Click here to download now
Overview: Companies deploy firewalls, manage wireless connectivity, control network-access privileges and install anti-virus software to protect their sensitive corporate data. But these solutions focus on the front door and can leave the back door wide open to a new kind of security breach. Like Trojan horses, USB and other removable storage devices such as Apple iPods, BlackBerrys and Flash drives enter the corporate environment and attach to computing assets without arousing suspicion or triggering security alerts. This white paper explains the best Practices for Managing and Enforcing USB Security.