Real World Risk Management Practical HR Resources
welcome
Are you a new user?
REGISTER HERE





RETRIEVE PASSWORD

USB Malware Attacks Spiking: What Should Employers Consider

Honeywell's annual report on USB-borne malware targeting industrial organizations reveals an increase in sophistication and potential risks for operations.

According to the report, 31 percent of the malware detected by Honeywell was associated with campaigns targeting industrial systems or companies. More than half of the detected malware was designed to spread via USB drives, and 80 percent of the detected malware was capable of disrupting operational technology processes. https://www.securityweek.com/honeywell-usb-malware-attacks-on-industrial-orgs-becoming-more-sophisticated/

Commentary

Organizations must invest in, and develop, standards regarding the use of USB and other peripherals. It is important to restrict access to peripherals by work devices.  

Other steps to consider include:

  • Install and maintain up-to-date security software that includes malware scanning, particularly designed to inspect and block malicious content on USB devices.
  • Turn off the auto-run functionality on computers to prevent USB malware from executing automatically upon insertion of drives.
  • Keep all systems updated with the latest security patches and updates. This reduces the risk of malware exploiting known vulnerabilities.
  • Maintain an inventory of all USB devices in use and ensure they are scanned regularly. Employ data loss prevention (DLP) software to monitor and restrict file transfers.
  • Develop and maintain an incident response plan that includes procedures for addressing USB malware detections.
Finally, your opinion is important to us. Please complete the opinion survey:

Authenticator Software: Being Exploited By Cybercriminals

Users seeking stronger security are duped into downloading fake security apps.

read more

Social Media Posts Lead To Malware-Ridden Resumés

Job posting sites have been the unwitting hosts of malware distribution programs. Learn about the risk.

read more

More Malware, Targeting macOS And Phone Apps, Spawns New Employer Cyber Risks

New data disproves the old belief that Mac devices are more secure. Learn about the risk.

read more

Cybercriminals Are "Swatting" Victims To Step Up The Pressure To Pay

Cybercriminals are using threats of "swatting" to gain cooperation with their cyber ransom demands. Learn about the risk.

read more