BNMC Blog

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

Then there is the story that came out of the College of Saint Rose in New York’s capital city of Albany early in April, 2019. An alumnus of the postgraduate school, Vishwanath Akuthota, was charged with, and pled guilty to, using what is known as a “USB killer” to fry the components of 59 Windows computers and seven Apple computers on campus. In all it has cost the college $58,371 to replace the computers.

A Indian national, in the United States on a student visa, Akuthota filmed himself destroying the machines on his iPhone. For his misdeeds, he faces as much as ten years in prison and a $250,000 fine for repeat.

What is USB Killer?

The “USB Killer” is a thumb drive that works by drawing power from the USB port to charge a capacitor in the USB, then discharging the power into the USB port, frying essential components inside the machine, leaving it broken. The device itself is available online and is usually advertised as a tool meant to test a devices surge protection.

Sabotage and Critical Mistakes

Every business wants to avoid situations like this. While there isn’t much you can do against the “USB Killer”, there is plenty you can do to help you ward against employee-induced catastrophe. According to an independent study, in 2018 more than two-out-of-every-three data breaches were the result of employee negligence, direct employee theft, or straight sabotage.

You read that right. You have a better chance of being put behind the eight ball by your employees than you do by any other person. That’s not to say your employees are out to get you, as only about a quarter of data breaches were a result of a current or former employee’s deliberate action, but rest assured you need to protect your network and computing infrastructure against situations in which there could be data loss triggered by your team.

How to Protect Your IT from Your Staff?

The first thing you should do is put together a strategy to snuff out potentially disastrous situations before they happen. That means training and monitoring. By training your staff on the best practices of using the systems they come into contact with, they’ll have a better understanding of how they work, and therefore will likely make fewer egregious errors.

On the other hand, if they understand the systems and are versed in solid practices, some of them will want to take liberties that they maybe wouldn’t have if they were less informed. This is why a thorough monitoring strategy is important. While this strategy will work to keep your data and infrastructure safer, it might just save you some time and money in lost productivity.

If your organization would like more information about how to train your staff properly, or how to sufficiently protect your network and infrastructure from all manners of threats, contact the IT pros at BNMC today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 28 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Productivity Cloud User Tips Email Software Microsoft Hackers Computer Network Security Hosted Solutions Malware Google Data Business Communication Efficiency Mobile Devices IT Services Tech Term Small Business Hardware IT Support Workplace Tips Internet Managed IT Services Cloud Computing Ransomware Innovation Smartphone Upgrade Outsourced IT Backup Data Recovery Smartphones Android Saving Money Mobile Device Windows 10 Facebook Miscellaneous Information Users Data Backup Windows Business Management Office 365 Server Phishing Managed IT Services Microsoft Office Social Media Cybersecurity Business Continuity Browser Internet of Things Data Management communications Network Windows 10 Passwords Gadgets Word Vulnerability Remote Monitoring App Gmail Productivity VoIP Chrome Managed Service Apps Artificial Intelligence Disaster Recovery Encryption Quick Tips Infrastructure Virtual Reality Settings Managed Service Provider Tip of the week Analytics BYOD Employer-Employee Relationship Website Access Control VPN Applications Money IT Support Router Save Money Company Culture Employee-Employer Relationship Google Drive Content Filtering Bandwidth Collaboration Firewall Maintenance Government Avoiding Downtime Apple Computers Antivirus Education Development YouTube Storage Networking Display Risk Management Hacker Data storage Office Tips IT Management Data Security Paperless Office Robot Virtual Private Network Big Data Automation Unified Threat Management Hosted Solution Information Technology Telephone Systems Downtime Humor Marketing desktop Administration Mouse Augmented Reality MSP SaaS Two-factor Authentication Managing Stress Wi-Fi OneNote Remote Workers Managed IT Service Holiday Data Breach Customer Relationship Management Scam Virtualization Document Management Windows 7 Wireless Solid State Drive Retail Alert Software as a Service Break Fix Printing HIPAA Search Password BDR Mobile Security Hard Disk Drive Vendor Management Monitors Business Technology Chromebook Server Management Laptop Spam Computing Touchscreen Outlook Business Intelligence The Internet of Things IT Bring Your Own Device Operating System Managed IT Social Network WiFi LiFi End of Support Tablet Social Data loss Language Value Virus Downloads Typing Regulations Safety Scalability Cybercrime Conferencing Mail Merge Blockchain Holidays Digital Payment Updates VoIP Unified Threat Management Best Practice Mirgation Recycling Remote Computing Managed Services Utility Computing Shortcut Distributed Denial of Service Distribution Current Events IoT Mixed Reality Firefox Superfish K-12 Schools Disaster Network Congestion Device Reducing Cost Bluetooth Comparison Cookies Digital Computing Infrastructure Professional Services LED Threats Cryptocurrency Social Networking Migration Consulting Address Permissions Payment Card Star Wars PowerPoint User Error Google Docs Chatbots eWaste Writing Laptops Patch Management Logistics IT solutions Going Green Halloween Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Hacks Nanotechnology Spyware Inventory Google Wallet Alerts USB File Sharing Dark Data Update Co-Managed IT Heating/Cooling Multi-Factor Security Bitcoin Motherboard Cables Computer Care IBM Fraud Cost Management Onboarding GDPR Time Management Printer Business Growth Identity Continuity Managed Services Provider Asset Management Politics Slack Hard Disk Drives Scary Stories Legal Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Emergency Shadow IT Unified Communications Drones Licensing Dongle Customer Service Content Huawei Servers Google Calendar Windows 8 Wires Training Corporate Profile Messaging Running Cable Assessment Automobile Private Cloud Digital Signage Data Warehouse Buisness Network Management Solar G Suite Office Samsung Entertainment Vendor Dark Web Memes Tech Support Monitoring Solid State Drives Sports Deep Learning Work Dell Shortcuts Mobile Management Virtual Desktop Cyber Monday Mobile Device Management Smart Tech Cooperation Service Level Agreement Cabling Streaming Processor Legislation Voice over Internet Protocol WannaCry Employee-Employer Relationships Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Alt Codes Compliance Social Engineering iOS Hybrid Cloud Microsoft Excel Websites Spying National Security Techology IT Technicians Optimization Security Cameras Profiles Smart Technology Connectivity Students How To Lenovo Budget Staff Leominster Human Error Memory Statistics Modem FinTech Analysis Printers IT Consultant Crowdsourcing Personal Information Botnet Cameras Meetings Cortana Tracking 3D Printing Cleaning Machine Learning CCTV Processors Unsupported Software Webcam Financial Error Computer Repair Relocation Mobile Data Point of Sale Ben McDonald shares Travel Recovery How To Work/Life Balance Health CrashOverride Black Market Regulation Supercomputer Motion Sickness Staffing Law Enforcement Administrator Electronic Medical Records Taxes Notifications IT Budget Physical Security Web Server what was your? Twitter Mobile Computing Emoji GPS Upgrades Gadget

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3