Our Blog: Stuff we think you should know

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

Then there is the story that came out of the College of Saint Rose in New York’s capital city of Albany early in April, 2019. An alumnus of the postgraduate school, Vishwanath Akuthota, was charged with, and pled guilty to, using what is known as a “USB killer” to fry the components of 59 Windows computers and seven Apple computers on campus. In all it has cost the college $58,371 to replace the computers.

A Indian national, in the United States on a student visa, Akuthota filmed himself destroying the machines on his iPhone. For his misdeeds, he faces as much as ten years in prison and a $250,000 fine for repeat.

What is USB Killer?

The “USB Killer” is a thumb drive that works by drawing power from the USB port to charge a capacitor in the USB, then discharging the power into the USB port, frying essential components inside the machine, leaving it broken. The device itself is available online and is usually advertised as a tool meant to test a devices surge protection.

Sabotage and Critical Mistakes

Every business wants to avoid situations like this. While there isn’t much you can do against the “USB Killer”, there is plenty you can do to help you ward against employee-induced catastrophe. According to an independent study, in 2018 more than two-out-of-every-three data breaches were the result of employee negligence, direct employee theft, or straight sabotage.

You read that right. You have a better chance of being put behind the eight ball by your employees than you do by any other person. That’s not to say your employees are out to get you, as only about a quarter of data breaches were a result of a current or former employee’s deliberate action, but rest assured you need to protect your network and computing infrastructure against situations in which there could be data loss triggered by your team.

How to Protect Your IT from Your Staff?

The first thing you should do is put together a strategy to snuff out potentially disastrous situations before they happen. That means training and monitoring. By training your staff on the best practices of using the systems they come into contact with, they’ll have a better understanding of how they work, and therefore will likely make fewer egregious errors.

On the other hand, if they understand the systems and are versed in solid practices, some of them will want to take liberties that they maybe wouldn’t have if they were less informed. This is why a thorough monitoring strategy is important. While this strategy will work to keep your data and infrastructure safer, it might just save you some time and money in lost productivity.

If your organization would like more information about how to train your staff properly, or how to sufficiently protect your network and infrastructure from all manners of threats, contact the IT pros at Haber Group today at 866.625.3560.

Tip of the Week: How to Keep Your Files Properly O...
The Limitless Future of Virtual Reality
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Computer Business Computing Microsoft Hosted Solutions Network Security Productivity Software Google Internet Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Ransomware Workplace Tips Windows 10 Smartphone IT Support Android Microsoft Office Saving Money Productivity Cloud Computing Facebook Browser Data Recovery Managed IT Services Business Continuity Social Media Data Management Server Users Office 365 Upgrade Phishing Internet of Things Innovation Word Managed IT Services Mobile Device Gmail Windows Data Backup Smartphones Disaster Recovery Outsourced IT Windows 10 App Passwords Network Vulnerability Chrome Cybersecurity Artificial Intelligence Business Management Information Miscellaneous communications Remote Monitoring Managed Service Provider Employer-Employee Relationship VoIP Encryption IT Support Hacker Gadgets Managed Service Content Filtering Government Money Spam Website Big Data BYOD Applications Infrastructure Save Money Apple Virtual Reality Tip of the week Analytics Office Tips Display Avoiding Downtime Settings Employee-Employer Relationship Antivirus The Internet of Things Two-factor Authentication Virtualization Access Control Bandwidth Robot Printing YouTube Router Automation Education Risk Management Wireless Apps IT Management Firewall Maintenance Augmented Reality Customer Service WiFi Tablet Data storage Paperless Office Safety SaaS Solid State Drive Networking Office Company Culture Downtime Outlook Wireless Technology Recovery Holiday Unified Threat Management Hosted Solution Hard Disk Drive VPN Monitors Data Security HIPAA Data loss Business Technology Operating System Chromebook Development Virtual Private Network Search End of Support Computing Server Management IBM Password Mobile Security Document Management Touchscreen Google Drive Mobile Device Management Mouse Vendor Management Administration Hacking Telephone Systems Customer Relationship Management Wi-Fi LiFi Laptop Quick Tips Computers Scam Business Intelligence Storage Retail Presentation Blockchain Cost Management Halloween Troubleshooting VoIP Legal Undo Google Calendar Chatbots Cortana FinTech iOS How To Drones Marketing Printer Wearable Technology Fun Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader Students WannaCry Going Green Social Engineering Application Computing Infrastructure Dongle Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Permissions Assessment Scary Stories Time Management Legislation Identity Update MSP Scalability Social IP Address Cybercrime PowerPoint Firefox Managing Stress Managed Services Cabling Typing FCC Smart Tech Mixed Reality Alerts Service Level Agreement Digital Payment eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Fraud Internet Exlporer Politics Sports LED Network Management Comparison Knowledge Migration Hacks Connectivity Mobile Office Onboarding Techology Budget Hard Drives SharePoint Collaboration Cables Laptops Managed IT Cryptocurrency Title II Slack Data Breach Digital Lenovo How To Licensing Private Cloud Continuity Mobility Google Maps Bring Your Own Device sip Managed IT Service Modem Value Tech Support Smart Office Co-Managed IT Specifications Compliance Experience Unified Communications Charging Mail Merge Online IoT Computer Care Running Cable Digital Signage Unified Threat Management Refrigeration Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion User Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Virtual Desktop Solar Print Toner Statistics Best Practice telephony Public Speaking Break Fix Cookies Samsung Address Writing Hotspot Professional Services Websites Identity Theft Buisness Work Content Google Docs Competition Black Friday Regulations Messaging Microsoft Excel Star Wars Training Lithium-ion battery Desktop User Error Multi-Factor Security Mirgation IT solutions Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Nanotechnology G Suite Corporate Profile Current Events Language USB 5G Optimization Streaming Cyber Monday Social Networking Analysis Employee-Employer Relationships Gadget Staffing Motion Sickness Taxes 3D Printing Personal Information Administrator Crowdsourcing Emergency Machine Learning IT Budget Web Server GPS Printers IT Consultant Unsupported Software Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health Domains Alert CCTV Emoji Webcam Windows 7 Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Regulation Law Enforcement Physical Security Travel CrashOverride Upgrades Notifications Botnet Supercomputer Twitter