BNMC Blog

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

Then there is the story that came out of the College of Saint Rose in New York’s capital city of Albany early in April, 2019. An alumnus of the postgraduate school, Vishwanath Akuthota, was charged with, and pled guilty to, using what is known as a “USB killer” to fry the components of 59 Windows computers and seven Apple computers on campus. In all it has cost the college $58,371 to replace the computers.

A Indian national, in the United States on a student visa, Akuthota filmed himself destroying the machines on his iPhone. For his misdeeds, he faces as much as ten years in prison and a $250,000 fine for repeat.

What is USB Killer?

The “USB Killer” is a thumb drive that works by drawing power from the USB port to charge a capacitor in the USB, then discharging the power into the USB port, frying essential components inside the machine, leaving it broken. The device itself is available online and is usually advertised as a tool meant to test a devices surge protection.

Sabotage and Critical Mistakes

Every business wants to avoid situations like this. While there isn’t much you can do against the “USB Killer”, there is plenty you can do to help you ward against employee-induced catastrophe. According to an independent study, in 2018 more than two-out-of-every-three data breaches were the result of employee negligence, direct employee theft, or straight sabotage.

You read that right. You have a better chance of being put behind the eight ball by your employees than you do by any other person. That’s not to say your employees are out to get you, as only about a quarter of data breaches were a result of a current or former employee’s deliberate action, but rest assured you need to protect your network and computing infrastructure against situations in which there could be data loss triggered by your team.

How to Protect Your IT from Your Staff?

The first thing you should do is put together a strategy to snuff out potentially disastrous situations before they happen. That means training and monitoring. By training your staff on the best practices of using the systems they come into contact with, they’ll have a better understanding of how they work, and therefore will likely make fewer egregious errors.

On the other hand, if they understand the systems and are versed in solid practices, some of them will want to take liberties that they maybe wouldn’t have if they were less informed. This is why a thorough monitoring strategy is important. While this strategy will work to keep your data and infrastructure safer, it might just save you some time and money in lost productivity.

If your organization would like more information about how to train your staff properly, or how to sufficiently protect your network and infrastructure from all manners of threats, contact the IT pros at BNMC today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 18 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Hackers Productivity Google Software Hosted Solutions Business Hardware Data Tech Term Communication Ransomware Internet Mobile Devices Small Business IT Services Efficiency Cloud Computing Data Recovery Smartphone IT Support Workplace Tips Backup Managed IT Services Android Saving Money Upgrade Windows Innovation Microsoft Office Users Social Media Business Continuity Information Office 365 Managed IT Services Data Backup Business Management Data Management Miscellaneous Outsourced IT Windows 10 Windows 10 Mobile Device Browser Smartphones Internet of Things Server Vulnerability Phishing Word App communications Gmail Cybersecurity Passwords Productivity Facebook Remote Monitoring Disaster Recovery Artificial Intelligence Encryption Network VoIP Chrome Infrastructure BYOD Apps Website Analytics Managed Service Save Money Employer-Employee Relationship Applications Virtual Reality Tip of the week Money IT Support Managed Service Provider Gadgets Google Drive Bandwidth VPN YouTube Content Filtering Access Control Maintenance IT Management Development Display Risk Management Education Apple Employee-Employer Relationship Quick Tips Office Tips Storage Robot Automation Big Data Paperless Office Router Hacker Data storage Settings Antivirus Government Unified Threat Management Company Culture Telephone Systems LiFi Augmented Reality Hosted Solution Holiday Networking desktop MSP Computers Virtualization Search Administration Managing Stress Retail Alert Collaboration Firewall Mouse Data Security Business Technology Server Management Document Management Virtual Private Network Touchscreen HIPAA Vendor Management Solid State Drive Monitors Wireless Printing Chromebook Tablet OneNote Laptop Mobile Security Hard Disk Drive The Internet of Things End of Support Business Intelligence Two-factor Authentication Downtime Avoiding Downtime Spam Computing Scam Outlook WiFi Bring Your Own Device SaaS Operating System Data loss Social Break Fix Shortcuts Mirgation Recycling Wi-Fi Budget Time Management Printer Monitoring Solid State Drives IoT Writing Streaming Processor K-12 Schools Information Technology Employee-Employer Relationships Cookies Typing Humor Digital Payment Black Friday Halloween Computing Infrastructure Professional Services Current Events Emergency Disaster iOS Social Networking Dark Data Best Practice Update Servers Google Calendar Digital Troubleshooting Business Analysis Dark Web Security Cameras Chatbots eWaste Network Management Spying National Security Star Wars Human Error Memory Wearable Technology Network upgrade Politics Analysis Students Nanotechnology Cryptocurrency Cyber Monday Scary Stories Alerts USB IT solutions Going Green Uninterrupted Power Supply Scalability Motherboard Cables Customer Service Google Docs Legislation Spyware Virus Office Hacks Samsung File Sharing Microsoft Excel Managed Services Identity Continuity Private Cloud Computer Care SharePoint IBM Updates Running Cable Fraud Cost Management Smart Technology Device Reducing Cost Buisness Smart Office Google Wallet Tech Support Techology Mixed Reality Screen Reader Charging Bitcoin Managed IT Sports Licensing Dongle How To Lenovo Migration Virtual Desktop BDR Wires Business Growth Statistics Identity Theft LED Threats Social Engineering Password Mail Merge Blockchain Laptops Solar Legal Training Downloads Corporate Profile PowerPoint Assessment Automobile Shortcut Distributed Denial of Service Mobility Batteries Work Unified Communications Drones Websites VoIP G Suite Unified Threat Management Data Breach Smart Tech Windows 8 Cooperation Service Level Agreement Firefox Superfish Dell Windows 7 Voice over Internet Protocol Bluetooth Comparison Co-Managed IT Safety Mobile Device Management Address Cabling Permissions Software as a Service Compliance Deep Learning WannaCry Onboarding GDPR Hotspot Internet Exlporer Patch Management Google Maps Managed IT Service Print Toner IT Technicians Optimization User Error Slack Hard Disk Drives Cybercrime Connectivity Remote Computing Huawei Marketing Staff Leominster Customer Relationship Management Messaging Modem FinTech Network Congestion Alt Codes Specifications Content Value Entertainment Regulations Heating/Cooling Multi-Factor Security Digital Signage Data Warehouse Language Processors Machine Learning IT Consultant Unsupported Software Cameras Meetings Tracking Computer Repair Relocation Cleaning Mobile Data CCTV How To Work/Life Balance Webcam Recovery Printers Health Black Market Error Law Enforcement Point of Sale Ben McDonald shares Notifications Travel Electronic Medical Records Physical Security Regulation Twitter Upgrades Gadget Emoji Supercomputer CrashOverride Financial Crowdsourcing Motion Sickness Staffing Administrator Myths Personal Information Botnet Taxes 3D Printing Web Server what was your? Cortana IT Budget Mobile Computing GPS

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3