<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aditi Zero Trust Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/aditi-zero-trust/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/aditi-zero-trust/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Tue, 10 Dec 2024 22:50:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Aditi Zero Trust Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/aditi-zero-trust/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stop Insider Theft &#038; USB Drive-By with Zero Trust</title>
		<link>https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Mon, 18 Nov 2024 21:02:18 +0000</pubDate>
				<category><![CDATA[Aditi Zero Trust]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[data storage control]]></category>
		<category><![CDATA[flashdrive]]></category>
		<category><![CDATA[thumb drive]]></category>
		<category><![CDATA[USB drive]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1483</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Remember Physical Data Security</h2>
<p>Just like fortified castle defenses, most electronic data security focuses on the internet.  Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords.  All are potentially exploited by data thieves.  But what about the old school theft?  What about in person physical theft of data?</p>
<p>&nbsp;</p>
<h3>Stealth Storage in a Pocket</h3>
<p>Insider theft and passers-by can too quickly pop in a USB drive and terabytes of data quickly and unnoticed.  Storage size and data transfer speed are no longer limitations for would be thieves.  Today&#8217;s reality is that even USB flash drives aka thumb drives can be found for less than $20 for 2TB of storage! </p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>USB flash drives</li>
<li>Portable 2.5&#8243; Solid State drives</li>
<li>Portable 2.5&#8243; hard disk drives</li>
<li>USB adapters for M2 SSD sticks</li>
<li>USB A, B, C</li>
<li>USB 3.0</li>
<li>mobile phones</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;"><span style="color: #333333;"><em>Gone In 60 Seconds?</em></span></h2></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="800" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg" alt="USB drive theft - gone in 60 seconds?" title="USB drive theft - gone in 60 seconds?" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1485" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>What About Our Ever Present Phones?</h3>
<p>And perhaps most stealth of all&#8230;the our ever present mobile phones!   Who would notice a cell phone connected to a computer?   Likely just a battery recharge right?   Maybe it&#8217;s more.   An iPhone can have to 1TB of storage and many Android phones have large storage AND the ability to add microSD cards for even more.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="717" src="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg" alt="transfer data between cell phones and computers" title="transfer data between cell phones and computers" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800-480x430.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1492" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;">USB Adapter for M.2 Internal SSD</h3>
<p style="text-align: center;"><strong>As high as 4TB of space, blazing fast, and small as a stick of gum!</strong></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="600" src="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg" alt="USB M.2 SSD adapter" title="m2 SSD usb adapter" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter-480x360.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1491" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What&#8217;s the Risk?  What&#8217;s At Stake?</h2>
<p>Everything valuable to you and your business.</p>
<p>HIPAA breach of protected health information (PHI).   Company proprietary secrets.   Customer private financial information, including social security numbers and other items covered by GLBA and consumer privacy laws.   Book of business &#8211; the clientele that you&#8217;ve worked so hard to build up over the years.  Embarasing photos or insinuating documents.</p>
<p>Breach of privacy laws can mean massive financial penalties by authorities, lawsuits, and potentially even jail time. And your reputation can flip from trusted authority to careless, untrustworthy people to avoid.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Stealth and Easy Use Enables Theft</h3>
<p>USB storage devices &#8211; portable drives and mobile phones, enable in-person, local theft of data if they are allowed.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>Theft happens in one of three ways:</h4>
<ol>
<li style="list-style-type: none;">
<ol>
<li>The door is left OPEN &#8211; the invitation to take unprotected things</li>
<li>An OUTSIDER breaks in &#8211; hacking and social engineering</li>
<li>Someone INSIDE is the thief &#8211; you&#8217;re given access as a team member</li>
</ol>
</li>
</ol>
<h2>Zero Trust Solution: Block USB</h2>
<p>The heavy handed IT admin&#8217;s solution is to simply block all USB ports.   No more connecting thumb drives, phones, or portable SSDs and HDDs.   Blocking USB drive storage can close an overlooked door that few choose to secure.  This follows the assumption that files copied or saved to extneral USB connected drives are suspect and not to be trusted.  This closes a real and serious security hole.  But it also can create a roadblock to work flow by denying USB connected devices that you WANT.  So, really a more nuanced and complex strategy is what most people want.  And it is what keeps IT admins from implementing it: complexity.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-300x102.png" width="300" height="102" alt="Aditi Zero Trust Protection" class="wp-image-1475 alignleft size-medium" />Let Aditi Zero Trust Do the Work</h2>
<p>A much more practical path forward to secure your data, while allowing dyanmic workplaces and convenience is with Aditi Zero Trust.   Data storage controls can regulate storage options by specific computer, workgroup, user, or even software program.  Our set of tools allows us to deal with all of the complexity of enabling software functionality and workflow that you need while locking down and blocking everything else.   Aditi Zero Trust is supported 24/7 and we are able to react to any new requests for software changes within a few minutes. So, you get the best overall security while keeping business flowing smoothly. </p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/">Contact Us Now to Learn More</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
