Hat Trick Blog
IT Corner: Don't Let Data Loss Burn a Hole in Your Pocket
Alex added on Monday 2nd November 2015 at 10:44am
USB Device Control!!!Prevent unauthorised use of removable storage devices. USB drives, MP3 players, CDs, DVDs, and other removable media, however useful, pose a real threat. Their small size and enormous storage capacity make it all too easy for confidential customer data and intellectual property to walk right out the front door and fall into the wrong hands—whether through loss or theft.
How do you know who is storing what on which type of device? And even if the person or persons have permission to use the data, how can you be sure they are keeping it secure?
Stop Data Leaks at the SourceNearly two thirds of serious data leakage incidents are caused by employees, contractors or visitors - whether through unintentional mistakes or by malicious intent.
Stop the press !!!
A new version of the killer pen drive has been created. The drive, which kills computers upon insertion, boasts twice the power of the original.
The original ‘USB killer' was created in March this year. It was made of a DC/DC converter and a field effect transistor. Once it was plugged into a computer, the killer device would charge up to 110V and fry the computer until it was destroyed.
This new invention, the USB killer version 2.0, once plugged in, shoots 220V directly into the signal lines of the USB, resulting in the summary execution of the computer.
The USB killer is not an entirely new idea, as the HackerNews noted. The Stuxnet worm was carried into an Iranian nuclear facility on a USB drive where, once plugged into a networked computer, was able to knock out large portions of the country's Uranium refining capabilities.
Dark Purple, the pseudonymous inventor of both version 1.0 and 2.0, exhibited the awesome power of his new invention in a proof-of-concept video posted on YouTube (click here to view).
This is a guest blog post written by David Thompson who is the current IT Manager for WCF Ltd. David will be writing a monthly article as part of the "IT Corner" column / slot. We hope you find these snippets of IT knowledge useful!
What to read next…
A new website build? Part 6. Search Engine Optimisation.
This really needs no introduction. So we'll get straight in... Search Engine Optimisation. Yeah your site was optimised thre…
Don't get caught out by Google's new security updates
Google have recently announced that (source) the latest version of their Google Chrome web browser will mark "HTTP sites that…
Our top local SEO tips
Search is becoming local and you cannot afford for your company to get left behind. Search engines such as Google are trying …
Website Tools: Website Monitoring
A website is often forgotten about when it comes down to hosting and up time. People assume that websites run 24 hours a day,…
What goes into the news or blog section of my website?
You've got a brand new website! It's got lots of cool features, images and people are telling you how great it is but.. sat s…
IT Corner: Onsite Backup vs Remote Backup
Regardless of the size of the business, every company needs a solid backup system. This means you need to have a robust bac…
Search by Date
- Jan 2014 (1)
- Feb 2014 (3)
- Mar 2014 (3)
- Feb 2015 (1)
- Mar 2015 (1)
- May 2015 (1)
- Jun 2015 (2)
- Jul 2015 (1)
- Sep 2015 (1)
- Oct 2015 (4)
- Nov 2015 (3)
- Dec 2015 (1)
- Jan 2016 (4)
- Feb 2016 (3)
- Mar 2016 (4)
- Apr 2016 (2)
- May 2016 (3)
- Jun 2016 (5)
- Jul 2016 (3)
- Aug 2016 (1)
- Sep 2016 (3)
- Oct 2016 (2)
- Mar 2017 (1)
- Apr 2017 (1)
- May 2017 (3)