SHARE
Facebook X Pinterest WhatsApp

USB Thumb Drives

USB Thumb Drives Removable devices are now the number one means of propagating malware. If your clients were to find a thumb drive in the parking lot, their impulse likely would be to plug it in and see what’s on there. But that’s a recipe for trouble. Garbage Can Good ol’ fashioned dumpster diving hasn’t […]

May 6, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1USB Thumb Drives

Removable devices are now the number one means of propagating malware. If your clients were to find a thumb drive in the parking lot, their impulse likely would be to plug it in and see what’s on there. But that’s a recipe for trouble.

2Garbage Can

Good ol’ fashioned dumpster diving hasn’t gone out of style among the data theft community. Throwing away paper documents with important data is just as risky as leaving the network wide open.

3Copy Machines

Many of your clients may not know it, but copy machines and printers retain a raft of data if they aren’t configured correctly–a fact that could be taken advantage of by malicious insiders or social engineers walking in the door.

4The Front Door

Speaking of the door, how many times have your clients’ employees allowed a stranger to just waltz on in behind them without a key card? And, for that matter, how many of your clients even use physical access cards.

5iPhones

They may be fun and useful business tools, but iPhones and iPods pose as much of a threat to the business environment as any other USB-enabled device.

6Post-It Notes

Jotting down usernames and passwords on a bit of sticky stationary may be convenient, but it sure does jack up the risks to the data that those credentials are meant to protect.

7Office Directory

The typical office directory is a treasure trove of information for a social engineer seeking to cozy up to unwitting employees in order to gain information to carry out further attacks.

8Delivered Flowers

A flower arrangement and a halfway-convincing delivery uniform is better than an access card with unlimited scope to a wily attacker seeking to obtain physical access to office and computer resources.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.