The topic of securing USB flash drives has come up in numerous conversations in the past. We have certainly covered this on the podcast, but it has once again come up in conversation and we wanted to address a few items here.
As most of you are aware, USB flash drive products have been on the market since 2000, and their use is increasing exponentially. As both consumers and businesses have increased demand for these drives, manufacturers are producing faster devices with greater data storage capacities. Companies, in particular, are at risk when potentially sensitive data is being stored on unsecured USB flash drives by employees who use the devices to transport data outside the office. The consequences of losing drives loaded with such information can be significant, including the loss of customer data, financial information, business plans and other confidential information, with the associated risk of reputation damage.
It is critical that you have a solid USB policy for your organization and that you are sufficiently blocking all unauthorized USB devices from being plugged into your corporate computer systems.
When it comes to securing these devices, there is a wide range of security based on your individual needs and the type of data that is being stored on these devices. The most important thing is that this data is encrypted, and that tamper protection and brute force attack prevention is enabled.
So…which is the right device for you? Although there are many to choose from and we can get into a huge post about the pros and cons of each, Rasha Consulting recommends one of two devices if you have an interest in securing your data on these devices. Either the Apricorn Aegis or the IronKey depending on the application. For the most secure applications that also require a very high degree of physical tamper protection, we recommend the IronKey, which was funded by the US Department of Homeland Security in 2006 and specifically designed to detect and prevent tampering with the internal mechanics of the device. For those applications that require a scaled back version of tamper protection, we recommend the Apricorn Aegis because it is more affordable, especially if you have larger storage size requirements. These are excellent devices and still offer an amazing level of protection for your data.
If you have any questions, please do not hesitate to reach out to us by sending an email to email@example.com
We are pleased to announce the launch of our Online Cybersecurity Awareness Training Program called CyberDefenseIQ. Online Cybersecurity Awareness Training is critical in educating employees about the threats that exist in modern technology. Our solution provides organizations with the ability to quickly educate employees through the use of a secure online training program. Each employee is given the opportunity to complete the training at their own pace, on either a computer or mobile device. At the completion of the program, a certificate of completion is sent to the organization to be filed with human resources. This is an amazing solution that has received tremendous feedback by attendees, and we encourage our customers to take advantage of this amazing offer. Check out the CyberDefenseIQ dedicated website by visiting https://CyberDefenseIQ.com
Defined by the California Department of Consumer Affairs, Contractors State License Board classifies a low voltage C7 contractor as “communication and low voltage contractor installs, services, and maintains all types of communication and low voltage systems which are energy limited and do not exceed 91 volts.”
To the layman, this means that it is a licensed installer or technician that has the experience and training to help you with your telephone and telecommunication systems, sound systems, cable television, closed-circuit video, satellite dish antennas, and low voltage landscape lighting. One of the many benefits of working with Rasha Consulting is that we are a licensed, bonded and insured contractor CA #1047834.
Cabling is essential infrastructure every business needs. But the quality or design of your cabling could be slowing your business down and impacting your efficiency and success. If you’re remodeling, recabling or relocating your business, the licensed, bonded and insured contractor like Rasha Consulting can provide planning, design, engineering and installation of your cabling system to enhance your business’s safety, efficiency and communication..
VOICE AND DATA CABLING
Voice, video, data and electronic cabling are essential for communication throughout your office building. Focusing on efficient and safe design, with the latest cable technology to enhance performance, Rasha Consulting takes a detail-oriented approach to the planning and installation of your voice and date cabling, for speedy and crystal clear communication.
Getting the best results requires careful planning, tailored engineering, thorough inspection and expert installation. That’s why Rasha Consulting offers complete structured cabling solutions to allow your business to exceed your performance expectations, while also allowing flexibility and the potential for growth into the future.
Your server room contains some of your business’s most valuable and important equipment. But a poorly designed and managed server room can slow down your systems, and put your equipment at risk of temperature and moisture damage. Streamline, update and organized your server room for maximizing efficiency with expert server room design, maintenance and restoration from Rasha Consulting.
Fiber optics represent an innovation in cabling that allows for far greater bandwidth than copper, greater security and immunity from electromagnetic interference (EMI). Fiber optic cabling has become the gold standard for high quality analog and digital communications, usually used as the primary connection between your local networking equipment.
Improve your business’s performance and efficiency with quality cabling inspection and the latest cabling installations from Rasha Consulting. Our expert cabling technicians will make a detailed assessment of your office space, layout and requirements, to engineer and install the ideal cabling solution for you.
At Rasha Consulting a common call we get is from people who have recently been infected with malware, virus, or junkware. It is important to note – If you are experiencing issues with malware, viruses or junkware, we highly recommend you contact us so we can assist you with removal and proactive monitoring to prevent issues like this in the future. For the purpose of this post, I am going to try to point you in the right direction with detecting and removal.
First, it is important that we start with explaining a few tools:
CCCleaner – This is a great free tool that assists in the removal of programs that are invasive and are known to cause issues. CCCleaner will do all the work in removing the applications safely and any registry entries, etc. that may exist.
TDSSKiller – This tool, which is made by Kaspersky is used to scan for rootkits and malicious software. This tool can be a bit tricky because it can from time to time provide false positives. It is critical that you do not use the tool to remove anything that you do not recognize. If you have questions, we encourage you to reach out to us for assistance.
ADW Cleaner – This tool is made by Malwarebytes and is one of my favorite tools to use to remove adware, junkware and toolbar pop ups, etc.
Malwarebytes – This tool is amazing for removing malware and malicious tools that have embedded themselves into your computer. The free version also includes a 14-day trial to conduct a deeper scan of the system, which you may or may not use depending on your situation.
Avast Virus Protection – This tool is a free antivirus program that can be installed and left on the computer. It will do a through scan of the computer and alert you of any viruses that are detected. It is free of charge but it does have a paid version if you wish to purchase it.
These tools are all free of charge and can be downloaded from our Digital Download Center. It is also important to note – if you are connected to a company network you should seek our assistance. Computers connected to a network can spread malicious software across the network, ultimately affecting other systems on the network.