USB Thumb Drives | Channel Insider

USB Thumb Drives

USB Thumb Drives Removable devices are now the number one means of propagating malware. If your clients were to find a thumb drive in the parking lot, their impulse likely would be to plug it in and see what’s on there. But that’s a recipe for trouble. Garbage Can Good ol’ fashioned dumpster diving hasn’t […]

May 6, 2010
2 minute read
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1USB Thumb Drives

Removable devices are now the number one means of propagating malware. If your clients were to find a thumb drive in the parking lot, their impulse likely would be to plug it in and see what’s on there. But that’s a recipe for trouble.

2Garbage Can

Good ol’ fashioned dumpster diving hasn’t gone out of style among the data theft community. Throwing away paper documents with important data is just as risky as leaving the network wide open.

3Copy Machines

Many of your clients may not know it, but copy machines and printers retain a raft of data if they aren’t configured correctly–a fact that could be taken advantage of by malicious insiders or social engineers walking in the door.

4The Front Door

Speaking of the door, how many times have your clients’ employees allowed a stranger to just waltz on in behind them without a key card? And, for that matter, how many of your clients even use physical access cards.

5iPhones

They may be fun and useful business tools, but iPhones and iPods pose as much of a threat to the business environment as any other USB-enabled device.

6Post-It Notes

Jotting down usernames and passwords on a bit of sticky stationary may be convenient, but it sure does jack up the risks to the data that those credentials are meant to protect.

7Office Directory

The typical office directory is a treasure trove of information for a social engineer seeking to cozy up to unwitting employees in order to gain information to carry out further attacks.

8Delivered Flowers

A flower arrangement and a halfway-convincing delivery uniform is better than an access card with unlimited scope to a wily attacker seeking to obtain physical access to office and computer resources.

Recommended for you...

JumpCloud Report Finds AI Agent Security Gaps Widening
Guardz Warns MSPs of Cloud Ransomware and BEC Risks
Aminu Abdullahi
Apr 28, 2026
Panasonic Connect introduces TOUGHBOOK 56 for Mobile Professionals
Luis Millares
Apr 20, 2026
OPSWAT, Emerson Partner on OT Cybersecurity Globally
Luis Millares
Apr 16, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.