How to Detect, Manage Malicious USBs

Monday, March 25, 2019 @ 11:03 AM gHale

New research shows USBs not only proliferate malware, but can be hacked to misuse legitimate USB functions, causing serious disruption for industrial operators.

Learn how manufacturers can tightly control and monitor USBs to ensure plant operations are secure, safe and productive.

RELATED STORIES
ARC: How to Prevent USB Attacks
Guide to Assessing IoT System Security
ARC: Safety and Profitability Work Together
ARC: Safety, Security Hand in Hand

Find out how to apply scalable and efficient USB security best practices that meet industry cybersecurity standards, reduce your portable media risks, and keep your plant compliant.

Evaluate alternative options to shutting down use of convenient portable media, which is sometimes the only file transfer option across legacy industrial machines, by including human authentication process steps combined with technical controls.

Walk away with scalable and efficient USB security best practices that meet industry cybersecurity standards, reduce your portable media risks, and keep your plant compliant.

Join this important webcast April 9 at 10 a.m. eastern time to lean how to secure USBs.



Leave a Reply

You must be logged in to post a comment.