Is that USB drive infected?
You might not know the answer to that question until it's too late. Unfortunately, the most common response to finding a USB drive is to plug it in. Virus-writers count on that response when they design the latest malware threats.
Network World discusses the way the Stuxnet worm has exploited this vulnerability.
Many companies have focused on the worm's ability to spread via USB flash drives. Malicious programs spreading through infected such devices have become a major problem for corporations, because of employee curiosity. In penetration tests conducted by Leviathan Security, 8 out of 10 employees that found a USB drive plugged it into a computer. All of those workers then went on to open up a spreadsheet labeled "LayoffNotice.xls," says Frank Heidt, CEO of Leviathan.
"You can tell your people, 'Hey, don't plug in USB sticks into your network,' but that is antithetical to human nature," Heidt says.
One way to combat this problem is to restrict unknown USB devices from your network and only allow devices with built-in antivirus protection. Kanguru includes integrated malware protection as a standard feature on all new secure flash drives. The network restrictions can be easily managed with Group Policy or one of the many Endpoint Security products now on the market.