Handle USB Drives and Removable Media Safely
Handle USB Drives and Removable Media Safely
Overview
USB drives, external hard drives, and SD cards are small, but they can move malware or sensitive data faster than almost anything else. This article walks you through safe handling so an innocent thumb drive does not become a breach.
Before You Begin
- Your company's removable-media policy. If your company forbids USB drives outright, follow that. Otherwise, the steps below apply.
- A clean encrypted USB drive issued by your company, if you have one.
- A trash bin or secure-shred container for retired drives.
Steps
- Use only USB drives issued by your company. Drives from conferences, vendors, or unknown sources can carry malware that runs the moment you plug them in.
- Never plug in a drive you found. The "lost USB" trick is one of the oldest attacks in the playbook and still works.
- Encrypt any work data you put on a removable drive. BitLocker To Go on Windows or FileVault for Mac external drives covers most situations. Your administrator can help.
- Label drives so you know what is on them. Plain unlabeled drives get lost and confused with each other.
- Store drives somewhere secure when not in use. A locked drawer is fine. A coat pocket left at a cafe is not.
- Eject drives properly before unplugging. Yanking a drive mid-write can corrupt the data and break encryption.
- Wipe drives before reusing them. A quick file delete leaves data recoverable. Use format with a full erase, or ask your administrator for a proper wipe tool.
- Retire drives properly. Damaged or old drives should go in your company's secure-shred container, not the regular trash.
Troubleshooting
- If a USB drive autoruns something when plugged in: disconnect immediately and tell your security team. Modern systems usually block autorun, but malware finds creative paths.
- If you lost a drive that held work data: report it the same day. The encryption status decides whether it is a small note or a real incident.
- If a vendor wants you to plug their drive into your work computer: ask them to send the file by email or secure share instead.
- If a USB drive feels warm or behaves oddly: stop using it. Some malicious USB devices act like keyboards or chargers and damage equipment.
Related Articles
Need More Help?
Submit a ticket at support.bostonmit.com or email support@bostonmit.com.
Related Articles
Browse the Web Safely at Work
Browse the Web Safely at Work Overview Most cyberattacks start with a web browser. A fake login page, a malicious ad, or a sketchy download can hand over your credentials in seconds. This article covers the safe-browsing habits that protect you and ...
Handle Sensitive Information at Work
Handle Sensitive Information at Work Overview Every company holds information that needs protection: customer details, employee records, financial data, contracts, and internal plans. This article gives you the everyday habits for handling that ...
Spot a Social Engineering Attempt
Spot a Social Engineering Attempt Overview Social engineering is when an attacker manipulates a person instead of hacking a computer. It works because humans are helpful, busy, and trust authority. This article gives you the patterns to spot and the ...
Stay Safe on Public Wi-Fi While Traveling
Stay Safe on Public Wi-Fi While Traveling Overview Airport lounges, coffee shops, and hotel lobbies all offer free Wi-Fi. They also offer attackers a front-row seat to whatever you do online. This article shows you how to keep working on the road ...