BNMC Blog

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

Then there is the story that came out of the College of Saint Rose in New York’s capital city of Albany early in April, 2019. An alumnus of the postgraduate school, Vishwanath Akuthota, was charged with, and pled guilty to, using what is known as a “USB killer” to fry the components of 59 Windows computers and seven Apple computers on campus. In all it has cost the college $58,371 to replace the computers.

A Indian national, in the United States on a student visa, Akuthota filmed himself destroying the machines on his iPhone. For his misdeeds, he faces as much as ten years in prison and a $250,000 fine for repeat.

What is USB Killer?

The “USB Killer” is a thumb drive that works by drawing power from the USB port to charge a capacitor in the USB, then discharging the power into the USB port, frying essential components inside the machine, leaving it broken. The device itself is available online and is usually advertised as a tool meant to test a devices surge protection.

Sabotage and Critical Mistakes

Every business wants to avoid situations like this. While there isn’t much you can do against the “USB Killer”, there is plenty you can do to help you ward against employee-induced catastrophe. According to an independent study, in 2018 more than two-out-of-every-three data breaches were the result of employee negligence, direct employee theft, or straight sabotage.

You read that right. You have a better chance of being put behind the eight ball by your employees than you do by any other person. That’s not to say your employees are out to get you, as only about a quarter of data breaches were a result of a current or former employee’s deliberate action, but rest assured you need to protect your network and computing infrastructure against situations in which there could be data loss triggered by your team.

How to Protect Your IT from Your Staff?

The first thing you should do is put together a strategy to snuff out potentially disastrous situations before they happen. That means training and monitoring. By training your staff on the best practices of using the systems they come into contact with, they’ll have a better understanding of how they work, and therefore will likely make fewer egregious errors.

On the other hand, if they understand the systems and are versed in solid practices, some of them will want to take liberties that they maybe wouldn’t have if they were less informed. This is why a thorough monitoring strategy is important. While this strategy will work to keep your data and infrastructure safer, it might just save you some time and money in lost productivity.

If your organization would like more information about how to train your staff properly, or how to sufficiently protect your network and infrastructure from all manners of threats, contact the IT pros at BNMC today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Business Computing Email Privacy Microsoft User Tips Network Security Software Productivity Hackers Google Malware Business Hosted Solutions Computer Communication Tech Term Data Ransomware Internet IT Services Efficiency Mobile Devices Small Business Cloud Computing Workplace Tips Backup Data Recovery IT Support Hardware Smartphone Android Saving Money Innovation Users Office 365 Information Managed IT Services Business Continuity Microsoft Office Windows Upgrade Internet of Things Data Backup Mobile Device Social Media Browser Managed IT Services Windows 10 Data Management Server Facebook Vulnerability Phishing Cybersecurity Gmail App Windows 10 Business Management Passwords Productivity Word Outsourced IT Chrome Miscellaneous communications Remote Monitoring Artificial Intelligence Network Disaster Recovery Encryption Smartphones Save Money Gadgets Managed Service Provider Analytics Employer-Employee Relationship Virtual Reality Managed Service Applications Website Money IT Support Infrastructure BYOD Tip of the week VoIP Settings Robot Apps Antivirus Development Automation Apple Education Employee-Employer Relationship Access Control VPN YouTube Paperless Office IT Management Government Hacker Router Data storage Risk Management Office Tips Unified Threat Management Company Culture Display Big Data Maintenance Google Drive Content Filtering Bandwidth Chromebook Document Management Scam Solid State Drive Wireless End of Support HIPAA Storage Networking Printing Mobile Security Hard Disk Drive OneNote Data Security SaaS Server Management Business Technology Touchscreen Business Intelligence Virtual Private Network Computers Virtualization Holiday Quick Tips Spam Computing Tablet Data loss Outlook WiFi Laptop Retail Alert Bring Your Own Device Operating System Telephone Systems The Internet of Things desktop LiFi Hosted Solution Augmented Reality Collaboration Firewall Administration Two-factor Authentication Managing Stress Avoiding Downtime Monitors Mouse Downtime Vendor Management Security Cameras Uninterrupted Power Supply Wearable Technology Network upgrade Specifications Marketing Spying National Security Spyware Cryptocurrency Nanotechnology Customer Relationship Management File Sharing IT solutions Alerts Going Green USB Heating/Cooling Multi-Factor Security Analysis Students Social Engineering Computer Care IBM Motherboard Google Docs Cables Human Error Time Management Printer Scalability Identity Continuity Break Fix Websites Fraud Hacks Cost Management Managed Services Google Wallet Smart Office Search Black Friday Updates Identity Theft Bitcoin Screen Reader Charging Licensing Dongle Servers Google Calendar Halloween Mixed Reality Safety Training Corporate Profile Business Growth Wires Emergency Device Password Assessment Network Management Migration G Suite Remote Computing Legal Solar Dark Web LED Automobile Laptops Network Congestion Dell Unified Communications Drones Work Cyber Monday PowerPoint Windows 8 Smart Tech Mobility Cabling Cooperation Service Level Agreement Legislation Scary Stories Data Breach WannaCry Voice over Internet Protocol Hotspot Mobile Device Management Internet Exlporer SharePoint Running Cable Writing Deep Learning Compliance Microsoft Excel Co-Managed IT Wi-Fi Google Maps Techology Software as a Service IT Technicians Optimization Managed IT Smart Technology Buisness Onboarding GDPR Connectivity Virtual Desktop Print Toner Dark Data Update Staff Leominster Statistics Sports Slack Hard Disk Drives Alt Codes Modem FinTech How To Lenovo Language Value Downloads Messaging Regulations Mail Merge Blockchain Content VoIP Unified Threat Management Entertainment Mirgation Budget Recycling Shortcut Distributed Denial of Service Digital Signage Data Warehouse Digital Payment Politics Social IoT Shortcuts Customer Service Disaster Information Technology K-12 Schools Bluetooth Comparison Monitoring Solid State Drives Digital Typing Cookies Humor MSP Firefox Superfish Private Cloud Computing Infrastructure Current Events Professional Services Employee-Employer Relationships Office Samsung Best Practice Social Networking Address Permissions Streaming User Error Cybercrime iOS Chatbots eWaste Patch Management Managed IT Service Troubleshooting Business Analysis Tech Support Star Wars Webcam Law Enforcement Electronic Medical Records Notifications Twitter Printers Error Physical Security Point of Sale Emoji Ben McDonald shares Upgrades Gadget Travel Crowdsourcing BDR Personal Information Botnet Cortana 3D Printing Supercomputer CrashOverride Regulation Motion Sickness Staffing Windows 7 Taxes Processors Administrator Machine Learning Web Server what was your? Unsupported Software IT Budget GPS Relocation Mobile Computing IT Consultant Computer Repair Cameras Mobile Data Meetings Recovery How To Tracking Work/Life Balance Health Cleaning CCTV Black Market

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3