Home

About Us

IT Services

Cybersecurity

News & Events

Blog

Support

Contact Us

Blog
  • Register

CoreTech Blog

USB PC Killer Terrorizes Private College

USB PC Killer Terrorizes Private College

Network security is a priority for modern organizations of all kinds… after all, threats don’t often discriminate between the computer networks that they try to access. One kind of organization that should be especially diligent is the modern college or university. There are many different kinds of sensitive data stored there, including the personal, medical, and financial trifecta, along with intellectual property.

Unfortunately, sometimes diligence isn’t enough, as exemplified by recent events at the College of Saint Rose in Albany, NY. The capital-based college was struck in early April 2019 by a rash of computer vandalism. Vishwanath Akuthota, a postgraduate alum, pled guilty to charges of using a device known as a USB Killer to permanently disable 59 Windows campus computers, as well as seven Apple computers. This act ultimately cost the college a total of $58,371 to replace these devices.

Akuthota, an Indian national in the United States on a student visa, used his iPhone to film himself using USB Killer to destroy the computers. As a result, he faces a $250,000 fine and ten years in prison.

Understanding USB Killer

USB Killer is a specially made thumb drive that draws power from the USB port, charging a capacitor within the device, then releasing that power back into the USB port. This overloads the components, burning them out and breaking the machine. The USB Killer is freely available online, apparently intended to be used as a surge protection test.

Where Your Biggest Risk Lies

Naturally, no business looks to have this kind of catastrophe happen. Unfortunately, USB Killer is particularly difficult to resist - but that doesn’t mean that there aren’t things you can do to help prevent the various kinds of employee-related security breaches. An independent study revealed that, in 2018, over two-thirds of data breaches were the result of an employee’s actions - whether they were negligent in their duties, were directly responsible for the data theft, or actively sabotaged the company.

That’s right - your employees are the ones who are most likely to put your business at risk. Now, this is not to say that your employees are actively working against you - only a quarter of data breaches were caused by the actions of employees, either current or former - but you still need to keep your network and infrastructure protected against the kinds of situations that could put your data at risk through the actions of your team.

How to Keep Your IT Protected from Your Staff’s Actions

The best way to approach these kinds of issues is to identify and mitigate them before they have an effect. This will require a two-fold approach: for your staff to be properly trained, and for you to have the tools necessary to monitor your business’ technology.

This is to help cover all of your bases. The better your staff is trained, the more prepared they will be to properly utilize the solutions you provide them with, making fewer and less severe errors as a result. However, the better your staff is trained, the more willing they will likely be to take liberties with these systems - liberties that they wouldn’t have otherwise. A comprehensive monitoring strategy will help you to keep your business, its infrastructure, and its data safe and productive.

To learn more about protecting your business through proper staff training and security solutions, reach out to the team at CoreTech by calling (270) 282-4926.

Tip of the Week: Rely Less on Your Printer
None of VoIP’s Issues Are Enough to Prevent You fr...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Network Security Cloud Business Computing Privacy Hackers Malware Internet Productivity Software Hosted Solutions Microsoft Mobile Devices Backup communications User Tips Data Backup Innovation Google Computer Email Disaster Recovery Data Recovery Hardware Efficiency Business IT Services Business Continuity Outsourced IT VoIP Business Management Productivity Data Tech Term Cybersecurity IT Support Communication Smartphone Managed IT Services Managed IT Services Workplace Tips Apps Upgrade Internet of Things Office 365 Windows 10 Windows 10 Smartphones Ransomware Windows Small Business Mobility Cybercrime Phishing Server Mobile Device Management Saving Money IT Support Data Security Managed IT Passwords Browser Law Enforcement Cloud Computing Operating System Android Microsoft Office Network Social Media Wireless BDR Miscellaneous Telephone Systems Virtualization Save Money Gadgets Holiday Collaboration Users Spam Automation Artificial Intelligence Password Money Risk Management BYOD Employer-Employee Relationship Quick Tips Health Computers Hosted Solution Facebook Telephony Applications Managed Service Provider Recovery Hacking Data Breach Gmail Chrome Encryption Government Business Technology Two-factor Authentication Router Work/Life Balance Avoiding Downtime Social Wi-Fi Cost Management Alert Personal Information Information Information Technology Antivirus SaaS Budget Application Vulnerability Best Practice Google Drive Update User Error OneNote Mobile Computing Flexibility Search Data Management Remote Monitoring Tech Support Conferencing Unsupported Software Word App Hacker Audit Politics VPN Meetings Social Engineering Cleaning Wireless Technology Blockchain Firewall Data Protection Current Events The Internet of Things Bandwidth Marketing Networking IT solutions Project Management Travel Private Cloud Printing Bring Your Own Device Proactive IT Shortcut Patch Management Hybrid Cloud Identity Theft Data Loss HaaS Sports History Battery Access Control Scam Virtual Private Network Fraud IT service Transportation Google Docs Wireless Charging Managed Service Big Data Apple Instant Messaging Going Green Internet Exlporer Downtime Excel Robot Solid State Drive End of Support Evernote Remote Computing Touchscreen WiFi Managing Stress Compliance eWaste Redundancy Data Storage Mobile Device Proactive File Sharing Value Augmented Reality Legal IT Management Employee-Employer Relationship Content Filtering Voice over Internet Protocol iPhone Education Office Mobile Security Phone System USB DDoS Commerce Devices Save Time Software as a Service MSP WannaCry Streaming Media Disaster Humor Benefits Office tips Cortana Paperless Office Computer Care Google Assistant Webinar Camera Safety 5G Language Payroll Updates intranet Memory Chromecast NFL Charger Data Privacy File Storage Analytics Retail Backup and Disaster Recovery Consultant Colocation Shadow IT iOS Licensing Telephone Hiring/Firing Computing Business Intelligence Amazon HIPAA Lifestyle Teamwork Scalability IT solutions Outlook Projects YouTube Hard Drives Settings Worker Commute SMB Bluetooth IT Technicians Files Microsoft Word IT budget Nanotechnology Point of Sale Admin Hard Drive Video Games HBO Break/Fix Lithium-ion battery Edge Computer Forensics Computer Fan Mobile Hyperlink Network Congestion Gifts Analysis Managed IT Service Virtual Assistant Legislation Reputation How To Windows 10s Employees Virus Wasting Money Microsoft Excel Remote Workers Company Culture Fax Server Maintenance Management Administrator Root Cause Analysis Automobile Windows Ink Utility Computing Chromebook Vendor Books Branding Medical IT Wearable Technology Ciminal PowerPoint Relocation Dark Web Professional Services Wasting Time Uninterrupted Power Supply App store Laptop Alexa for Business Experience Comparison E-Commerce Hard Disk Drive Regulation Windows 7 OneDrive PDF Security Cameras Trending Device Security Identities Financial Access Advertising Document Management Google Maps Keyboard Shortcuts Wireless Internet Accessory Smart Technology Television Credit Cards Touchpad Screen Mirroring Specifications Payment Cards Unified Threat Management Sync Display Keyboard Domains Sabotage Websites Data storage Text Messaging Storage Machine Learning Saving Time Testing Electronic Medical Records e-waste Running Cable IoT Human Resources Vendor Management Workers Emails WIndows Server 2008 Gamification Tablets Peripheral FAQ Identity Avoid Downtime Cast WPA3 Music Sales Employee Upgrades Administration Black Market Virtual Reality Adobe Co-Managed Services PC Distributed Denial of Service Data Theft Entertainment SharePoint Spyware Samsung Content Filter Monitors Smartwatch Twitter Emergency Training Monitoring Students Computer Accessories Printers Cache Unified Communications Worker Financial Technology Smart Tech CrashOverride Connectivity

Understanding IT

IT can be a complicated thing - trust us, we know. With so much terminology and moving parts to keep track of, there are a lot of concepts that can be tricky to grasp without a little guidance. We’re here to provide this guidance with a few brief guides to key IT topics. Check them out here.

Contact Us

Learn more about what CoreTech can do for your business.

Call Us Today
Call us today
(270) 282-4926

1711 Destiny Lane
Suite 116

Bowling Green, Kentucky 42103