Our Blog: Stuff we think you should know

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

Then there is the story that came out of the College of Saint Rose in New York’s capital city of Albany early in April, 2019. An alumnus of the postgraduate school, Vishwanath Akuthota, was charged with, and pled guilty to, using what is known as a “USB killer” to fry the components of 59 Windows computers and seven Apple computers on campus. In all it has cost the college $58,371 to replace the computers.

A Indian national, in the United States on a student visa, Akuthota filmed himself destroying the machines on his iPhone. For his misdeeds, he faces as much as ten years in prison and a $250,000 fine for repeat.

What is USB Killer?

The “USB Killer” is a thumb drive that works by drawing power from the USB port to charge a capacitor in the USB, then discharging the power into the USB port, frying essential components inside the machine, leaving it broken. The device itself is available online and is usually advertised as a tool meant to test a devices surge protection.

Sabotage and Critical Mistakes

Every business wants to avoid situations like this. While there isn’t much you can do against the “USB Killer”, there is plenty you can do to help you ward against employee-induced catastrophe. According to an independent study, in 2018 more than two-out-of-every-three data breaches were the result of employee negligence, direct employee theft, or straight sabotage.

You read that right. You have a better chance of being put behind the eight ball by your employees than you do by any other person. That’s not to say your employees are out to get you, as only about a quarter of data breaches were a result of a current or former employee’s deliberate action, but rest assured you need to protect your network and computing infrastructure against situations in which there could be data loss triggered by your team.

How to Protect Your IT from Your Staff?

The first thing you should do is put together a strategy to snuff out potentially disastrous situations before they happen. That means training and monitoring. By training your staff on the best practices of using the systems they come into contact with, they’ll have a better understanding of how they work, and therefore will likely make fewer egregious errors.

On the other hand, if they understand the systems and are versed in solid practices, some of them will want to take liberties that they maybe wouldn’t have if they were less informed. This is why a thorough monitoring strategy is important. While this strategy will work to keep your data and infrastructure safer, it might just save you some time and money in lost productivity.

If your organization would like more information about how to train your staff properly, or how to sufficiently protect your network and infrastructure from all manners of threats, contact the IT pros at Haber Group today at 866.625.3560.

Tip of the Week: How to Keep Your Files Properly O...
The Limitless Future of Virtual Reality


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Computer Network Security Software Hosted Solutions Google Productivity Internet Tech Term Communication Data Small Business Ransomware Backup Mobile Devices Efficiency IT Services Workplace Tips Hardware Windows 10 Cloud Computing Smartphone IT Support Microsoft Office Saving Money Android Data Recovery Upgrade Office 365 Productivity Facebook Information Browser Users Business Continuity Social Media Managed IT Services Gmail Windows Data Management Server Managed IT Services Phishing Mobile Device Word Internet of Things Data Backup Innovation Outsourced IT Miscellaneous Windows 10 Disaster Recovery Smartphones Passwords App Chrome Remote Monitoring communications Artificial Intelligence Business Management Managed Service Provider Employer-Employee Relationship VoIP Vulnerability Cybersecurity Encryption Network Apple Virtual Reality Hacker Gadgets Applications Content Filtering Spam Analytics Infrastructure Website IT Support Big Data Money Government Apps Tip of the week BYOD Managed Service Save Money Office Tips Router Settings Development Two-factor Authentication Virtualization Data storage Paperless Office Bandwidth Display YouTube IT Management Education Unified Threat Management Robot Maintenance Risk Management Wireless Printing Automation Tablet Firewall Antivirus Employee-Employer Relationship Customer Service WiFi Augmented Reality Avoiding Downtime VPN Access Control The Internet of Things Wireless Technology Computers Data loss Business Technology Recovery Storage Virtual Private Network Downtime Hosted Solution OneNote Retail Server Management SaaS Touchscreen Mobile Security Outlook Search Telephone Systems Monitors Holiday IBM Quick Tips Administration Business Intelligence Operating System Chromebook Mobile Device Management Hacking Scam Collaboration Customer Relationship Management End of Support Bring Your Own Device Solid State Drive Wi-Fi Computing Document Management Company Culture Google Drive Laptop Password Networking Mouse Vendor Management Presentation Hard Disk Drive HIPAA LiFi Safety Office Data Security eWaste Device BDR Servers Distributed Denial of Service Application Mixed Reality Windows 8 Training Alerts Service Level Agreement Fun Google Wallet Network Management Automobile Comparison Migration Business Growth G Suite Fraud Internet Exlporer LED SharePoint Cables Laptops Managed IT Title II Connectivity Scary Stories Onboarding Current Events Techology Continuity Mobility Legal Google Maps Managed IT Service Modem IP Address Cybercrime Slack Data Breach Digital Lenovo Licensing Co-Managed IT Drones Specifications Compliance Charging Alt Codes Dark Data Mail Merge Value Smart Office Downloads IT Technicians Knowledge Wires Software as a Service Disaster Shortcut Remote Computing Online IoT Sports Hard Drives Digital Signage GDPR Going Green Social Engineering Unified Threat Management Solar Print Toner Statistics Update Break Fix Cookies Mobile Office Monitoring Hard Disk Drives Social Spyware Superfish Cooperation Work Content Black Friday Regulations Messaging Typing Address Hotspot Professional Services Multi-Factor Security Digital Payment Mirgation Experience Unified Communications User Voice over Internet Protocol Entertainment Deep Learning Humor Uninterrupted Power Supply Patch Management Microsoft Excel Star Wars Refrigeration Desktop Data Warehouse User Error Business Analysis Staff Public Speaking Shortcuts Bluetooth Dark Web Nanotechnology Running Cable Spying Solid State Drives Hacks Politics Optimization Streaming Budget Cyber Monday Social Networking Analysis Employee-Employer Relationships Cryptocurrency Corporate Profile Language USB Virtual Desktop Competition Private Cloud Google Calendar Chatbots FinTech iOS sip Blockchain Cost Management Buisness Troubleshooting How To VoIP Tech Support Printer Wearable Technology IT solutions Security Cameras Net Neutrality Screen Reader Lithium-ion battery National Security How To Recycling Human Error IT service Heating/Cooling File Sharing Smart Technology Motherboard Students Bitcoin Network Congestion WannaCry Computer Care Computing Infrastructure Dongle Time Management Legislation Identity MSP Scalability Best Practice telephony Samsung Permissions Assessment 5G Undo Information Technology Websites Identity Theft Cortana Managing Stress Managed Services Google Docs Cabling FCC Smart Tech Halloween Marketing PowerPoint Updates Writing Firefox Physical Security Travel Law Enforcement Upgrades Notifications Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Windows 7 Crowdsourcing Taxes Machine Learning IT Budget Web Server Domains GPS Unsupported Software Computer Repair Regulation IT Consultant Relocation Processors Cameras Tracking Meetings CrashOverride Mobile Data Health Cleaning Alert CCTV Emoji Webcam Electronic Medical Records Emergency Work/Life Balance Error Printers Black Market Point of Sale Mobile Computing