{"id":2313,"date":"2013-08-12T10:00:07","date_gmt":"2013-08-12T14:00:07","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=2313"},"modified":"2020-02-26T20:27:07","modified_gmt":"2020-02-26T14:57:07","slug":"usb-hygiene","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/usb-hygiene\/2313\/","title":{"rendered":"USB Hygiene"},"content":{"rendered":"<p align=\"center\"><b>USB Hygiene<\/b><\/p>\n<p>By this point you should be fairly well aware of the threats facing you when browsing the Internet on your digital devices. From phishing scams in your inbox to malicious banner links, surfing the Web can bring danger if you\u2019re not already protecting yourself with a reliable antivirus. But what about the threats you face offline? It\u2019s important to remember that your computers are not just vulnerable to cyberattacks; it\u2019s now becoming more and more common for attackers to find new ways to infiltrate your devices, like through your removable media.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/08\/05083428\/usb_title_EN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2472\" alt=\"usb_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/08\/05083428\/usb_title_EN.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>In fact, about 30% of malware infections are spread via removable media like USB sticks and SD cards.<\/p>\n<div class=\"pullquote\">In fact, about 30% of malware infections are spread via removable media like USB sticks and SD cards.<\/div>\n<p>Most of us use these devices fairly frequently as well, whether for sharing documents amongst coworkers or passing along photos from our latest trip to our friends and family members. They may seem harmless enough, but if they fall into the wrong hands they could be used for highly destructive purposes.<\/p>\n<p>In 2012 two US power plants were infiltrated when an employee inadvertently brought an infected USB stick onto the premises. And although this case is extreme, it\u2019s proof that a small device can cause a large amount of damage.<\/p>\n<p>This type of attack can be carried out in a couple of different ways. An attacker might infect a computer with malware that can determine when a USB drive is plugged in, with the hopes that the infected drive will then be plugged into another computer, spreading the virus. They can also be used to steal information directly from computers, which could be detrimental to anyone who has confidential information stored on their systems. What\u2019s more is, given their compact size it\u2019s incredibly easy for these devices to be lost or stolen and used for harm.<\/p>\n<p>Luckily, we\u2019ve compiled some helpful tips to help keep your USB sticks clean and your computers safe.<\/p>\n<p><i>Configure your OS to avoid running anything from USBs. <\/i>If an attacker was to leave infected USB cards in your office and you were to pick one up and plug it into your computer, you would want to be sure you had already set up your antivirus software to prevent the opening and running of any infected files. If you\u2019re using Kaspersky Pure, you can set up an <a href=\"https:\/\/www.kaspersky.com\/blog\/auto-scanning-usb\/\" target=\"_blank\" rel=\"noopener nofollow\">auto-scan<\/a> of your USB stick easily within your settings. Just go into General Scan Settings and select either <b>do not scan<\/b> or p<b>rompt for action<\/b>, which will allow you to do a quick scan, full scan, or no scan whenever a removable device is detected.<\/p>\n<p><i>Patch your OS:<\/i> Whenever your OS offers you a patch update, you should be downloading it. Patches are released to improve upon imperfections and vulnerabilities within your software, and neglecting to keep up with the latest versions could make you susceptible to viruses. In the case of USB malware, you\u2019ll want to make sure your OS is patched against AutoRun exploits so your system is not automatically running anything from your removable devices.<\/p>\n<p><i>Don\u2019t copy executable files: <\/i>Executable files can cause your computer to perform tasks that have been assigned by encoded\u00a0<a title=\"Instruction (computer science)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Instruction_(computer_science)\" target=\"_blank\" rel=\"noopener nofollow\">instructions<\/a>. You can imagine the danger of copying this type of file from an unknown source, so it\u2019s best to avoid doing so altogether. We recommend downloading all software directly from official, trusted sites only.<\/p>\n<p><i>Keep your drives separate: <\/i>On top of making sure you\u2019re only using USB drives given to you by trusted sources, you should also make sure you aren\u2019t using them to mix business with pleasure. It\u2019s safest to keep your work and personal information separate from one another, especially if your USB sticks are being used by multiple people in your home or office.<\/p>\n<p>Exercising caution is best when it comes to protecting yourself. If you follow our advice and use a <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/pure?domain=kaspersky.com\" target=\"_blank\" rel=\"noopener\">trusted antivirus<\/a>, you should be fine to use your removable devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>USB Hygiene By this point you should be fairly well aware of the threats facing you when browsing the Internet on your digital devices. From phishing scams in your inbox<\/p>\n","protected":false},"author":189,"featured_media":2314,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[264,192,97],"class_list":{"0":"post-2313","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-device-security","9":"tag-protection","10":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/usb-hygiene\/2313\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/usb-hygiene\/2378\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/usb-hygiene\/2253\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/usb-hygiene\/2471\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/usb-hygiene\/1492\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/usb-hygiene\/1391\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/usb-hygiene\/2471\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/usb-hygiene\/2471\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/device-security\/","name":"device security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=2313"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2313\/revisions"}],"predecessor-version":[{"id":18860,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2313\/revisions\/18860"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/2314"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=2313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=2313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=2313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}