As the electronic medical records revolution takes hold of the healthcare industry, the benefits and drawbacks of digitized health documentation are being revealed. On one hand, the convenience of putting this data online enables healthcare professionals to provide more collaborative and knowledgeable care by...
USB flash drives and other portable devices are valuable tools in the typical government staffer's virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. But left unchecked, the use of portable devices can also potentially infect public...
With great advantages come great responsibilities. As the advances in USB devices have made them invaluable to most business users' workday processes, they have also exposed their organizations to three enormous risks: data loss, data theft and malware propagation.
Learn how removable device policy enforcement can...
As of March 1, 2010, all organizations with operations and/or customers in the state of Massachusetts will be required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information.
These requirements include enforcing password security,...
The DoD has banned the use of USB devices after an unauthorized device containing "agent.btz", a variation of the Storm Worm, was connected to a sensitive DoD network causing massive outages. To ensure security without impeding government business, a new policy is forthcoming that will require the management and...
As USB devices have evolved into useful storage media, they've also turned into a security nightmare for agencies.
The usage of USB devices should be encouraged and embraced to improve productivity, but they also must be managed to minimize the risks inherent with these tools.
This paper discusses how USB...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.