{"id":1916,"date":"2007-05-07T00:00:00","date_gmt":"2007-05-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/07\/thumb-drives-replace-malware-as-top-security-concern-study-finds\/"},"modified":"2021-12-30T11:40:17","modified_gmt":"2021-12-30T11:40:17","slug":"thumb-drives-replace-malware-as-top-security-concern-study-finds","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/07\/thumb-drives-replace-malware-as-top-security-concern-study-finds\/","title":{"rendered":"Thumb Drives Replace Malware As Top Security Concern, Study Finds"},"content":{"rendered":"<p>A worker calls up a sensitive investor list and downloads it on her thumb drive, slips it into her pocket, and walks out, smiling and waving to her boss and the security officer stationed at the front door.   According to one recent study, IT managers said portable storage devices, such as thumb drives and MP3 players, have surpassed even malware to become a top concern.  The study, which polled 370 IT professionals, showed that 38.4% of IT managers say portable storage devices are their top security concern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It is very easy to download information to them quickly,&#8221; said Bill Piwonka, VP of product management for Centennial Software, which conducted the survey at this spring&#8217;s InfoSec security conference in London.  &#8220;If there isn&#8217;t a defined acceptable use policy or controls to prevent the download and transfer of sensitive data, managers do not know if and how such data is leaving the building.&#8221;<\/p>\n<p>To make matters worse, 80% of respondents admitted that their organizations don&#8217;t currently have effective measures in place to combat the unauthorized use of portable devices.  And 43.2% cited no control at all.  The study showed that 65% of IT managers use a USB flash drive on a daily basis.<\/p>\n<p>http:\/\/www.informationweek.com\/news\/showArticle.jhtml?articleID=199300021<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1916","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1916"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1916\/revisions"}],"predecessor-version":[{"id":4403,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1916\/revisions\/4403"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}