CyberSecurity

Beware of Flash Drive Hacker Scams

Beware of Flash Drive Hacker Scams
[cz_image id=”cz_29055″ image=”12051″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_14731″ cz_title=””]Flash Drives (or USB Drives) may seem like an innocuous item to find laying around in an office environment. You may find one and decide to use it, or simply plug it into your computer to see if you can identify an owner. What you might not know is that this can be bait used by hackers to gain access to your computer and network. Don’t fall victim to the flash drive hacker scam.

 

Hackers commonly use flash drives to infiltrate networks and steal sensitive information. This is especially risky because code can be executed just by inserting a “hacked” device into your computer. Here’s how you can protect yourself and your business:

 

IF YOU SEE A FLASH DRIVE THAT ISN’T YOURS, DON’T INSERT IT INTO YOUR COMPUTER

It may be tempting to claim a found flash drive as your own or curiosity might get the best of you. However, it’s important to remember that you should never, under any circumstances, insert a flash drive into your computer without know exactly where it came from. It could be fine but it could also be a costly and unnecessary security risk to your business. Definitely not worth the free USB stick. If you find a flash drive and want to return it to its owner, try sending an email out to your co-workers asking if someone has lots it instead of trying to find clues about the owner in the files on the drive.

 

ONLY PURCHASE NAME-BRAND FLASH DRIVES FROM REPUTABLE RETAILERS

Another, equally harmful flash drive hacker scam is counterfeit “high-capacity” flash drives being sold online, particularly on sites like Ebay. These USB drives are sold at prices that are too good to be true, promising large amounts of storage. Many times they are doctored and will cause security issues for your business if used. It is very important to only purchase name-brand flash drives from reputable retailers. If you see a deal online for some off-brand USB drives that look too good to be true, it probably is. Even if the packaging and product look legitimate, it could be a scam.

 

IMPLEMENT A COMPANY POLICY REGARDING FLASH DRIVES

The most effective thing you can do to protect your business is making sure your employees are educated about flash drive hacker scams and what’s expected of them should they find a USB drive laying around. A good policy will outline what to do in a situation where a flash drive is found. If your company doesn’t have a policy, always ask someone if your IT department for guidelines.

 

Using these tips can save your company from the potential harms of flash drive hacker scams. Les Olson Company offers Managed IT Services, including data and network security services. Please contact us for a free security consultation.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

Related Posts