You are here: Home / USB Security / Guidelines in the usage of USB devices

Guidelines in the usage of USB devices

Do’s

  • Always do low format for first time usage.

  • Always delete the drive securely to clear the contents.

  • Always scan USB disk with latest Antivirus before accessing.

  • Protect your USB device with a password.

  • Encrypt the files / folders on the device.

  • Use USB security products to access or copy data in your USB.

  • Always protect your documents with strong password.

 For Small Business or Enterprises

  • Monitor what data is being copied.

  • Block the unauthorized USB from connecting.

  • Pick the device with features and correct level of encryption to meet compliance requirements and organization needs.

  • Educate employees on acceptable and inacceptable use of USB flash drives.

  • Document policies so that users know who is authorized and what they are authorized to do.

Don’ts

  • Do not accept any promotional USB device from unknown members.

  • Never keep sensitive information like username/passwords on USB disk.

Mobile as USB

The mobile phones can be used as USB memory devices when connected to computer. A  USB cable is provided with the mobile phone to connect to computer.

Do’s:

  • When a mobile phone is connected to a personal computer, scan the external phone memory and memory card using an updated antivirus.

  • Take regular backup of your phone and external memory card because if an event like a system crash or malware penetration occurs, at least your data is safe.

  • Before transferring the data to Mobile from computer, the data should be scanned with latest Antivirus with all updates.

  • Remember to remove the USB connection from your computer before you walk away.

 Don’ts:

  • Never forward the virus affected data to other Mobiles.

 FAQ

How to bypass autorun?

Hold shift key and plug your thumb drive to disable autorun temporarily

How to encrypt your data?

True  crypt is a powerful open source freeware for protecting data on USB drive. It works on Windows, Mac and Linux platforms. It supports full encryption of system hard drives and USB devices.

The tool comes in a very easy to use package. Plug in your USB drive and open true crypt executable. Create volume for your USB drive and follow the instructions. You provide a password to protect the data and that’s it! You can view the encryption progress in the pool content.  You can select AES, Serpent or Twofish encryption algorithm. To access the databack you just need to enter the password.

Animated Videos

Download Brochures

Related Links
Incident Reporting

To report cyber incident, please visit,
http://www.cert-in.org.in

This is Schools Diazo Plone Theme