Hat Trick Blog
IT Corner: Don't Let Data Loss Burn a Hole in Your Pocket
Alex added on Monday 2nd November 2015 at 10:44am
USB Device Control!!!Prevent unauthorised use of removable storage devices. USB drives, MP3 players, CDs, DVDs, and other removable media, however useful, pose a real threat. Their small size and enormous storage capacity make it all too easy for confidential customer data and intellectual property to walk right out the front door and fall into the wrong hands—whether through loss or theft.
How do you know who is storing what on which type of device? And even if the person or persons have permission to use the data, how can you be sure they are keeping it secure?
Stop Data Leaks at the SourceNearly two thirds of serious data leakage incidents are caused by employees, contractors or visitors - whether through unintentional mistakes or by malicious intent.
Stop the press !!!
A new version of the killer pen drive has been created. The drive, which kills computers upon insertion, boasts twice the power of the original.
The original ‘USB killer' was created in March this year. It was made of a DC/DC converter and a field effect transistor. Once it was plugged into a computer, the killer device would charge up to 110V and fry the computer until it was destroyed.
This new invention, the USB killer version 2.0, once plugged in, shoots 220V directly into the signal lines of the USB, resulting in the summary execution of the computer.
The USB killer is not an entirely new idea, as the HackerNews noted. The Stuxnet worm was carried into an Iranian nuclear facility on a USB drive where, once plugged into a networked computer, was able to knock out large portions of the country's Uranium refining capabilities.
Dark Purple, the pseudonymous inventor of both version 1.0 and 2.0, exhibited the awesome power of his new invention in a proof-of-concept video posted on YouTube (click here to view).
This is a guest blog post written by David Thompson who is the current IT Manager for WCF Ltd. David will be writing a monthly article as part of the "IT Corner" column / slot. We hope you find these snippets of IT knowledge useful!
What to read next…
A new website build? Part 3. Content Management Systems.
Part 3 of our series on things to consider when thinking about a website redesign. This week its focussed around Content M…
IT Corner: Internet Explorer Versions 7, 8, 9 and 10 reach end of life
A report has revealed that 61 per cent of small business owners are still using Internet Explorer 8, 9 and 10, despite all …
A new website build? Part 6. Search Engine Optimisation.
This really needs no introduction. So we'll get straight in... Search Engine Optimisation. Yeah your site was optimised thre…
IT Corner: Onsite Backup vs Remote Backup
Regardless of the size of the business, every company needs a solid backup system. This means you need to have a robust bac…
IT Corner: Password Security Tips
Tips and Tricks to Keep your Password Strong, Safe and Memorable. Creating a strong password is one of…
Why Isn't Anyone Coming to My Website?
Is your website slipping down the ranks of Google? Is it receiving less and less visits? Does it need some love? With this bl…