{"id":31736,"date":"2017-12-08T08:00:32","date_gmt":"2017-12-08T07:00:32","guid":{"rendered":"http:\/\/e3mag.com\/?p=31736"},"modified":"2022-05-01T09:22:19","modified_gmt":"2022-05-01T07:22:19","slug":"security-risk-usb-stick","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sicherheitsrisiko-usb-stick\/","title":{"rendered":"Security risk USB stick"},"content":{"rendered":"<p>Data carriers as a security vulnerability are a greater risk than you might think: according to a study commissioned by the American Computing Technology Industry Association (CompTIA), one in five people who finds a foreign data carrier takes it and connects it to their own computer without hesitation.<\/p>\n<p>In addition, 69 percent of finders do not take any security precautions before opening the data media and files, according to a study by the American University in Illinois.<\/p><div id=\"great-2931892839\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>In doing so, they give viruses and spyware free access to their devices and - in times of modern work practices such as Bring Your Own Device (BYOD) - endanger not only their private IT security, but also that of their employers.<\/p>\n<h3>Minimize security risk<\/h3>\n<p>The basis for effective protection is a far-reaching security concept with a well thought-out catalog of measures that includes sensitization and training of employees. Above all, users should be clear about exactly what to do in which scenario and who to contact.<\/p>\n<p>Which internal company data may be stored on external data carriers and to what extent? How should employees behave if they find stray USB sticks in public places?<a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Security risk usb-stick\" class=\"aligncenter wp-image-31738 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712.jpg\" alt=\"Holger Huegel, data, viruses, data protection\" width=\"800\" height=\"605\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-768x581.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-100x76.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-480x363.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-640x484.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-720x545.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>After these questions have been implemented in a company-wide policy, only one question remains: Which software solutions can be used to secure data that is used outside the organization?<\/p>\n<p>Most large and medium-sized companies store sensitive data such as confidential financial data or personal data in SAP. This makes them secure at first glance.<\/p>\n<p>At second glance, however, it becomes clear that SAP data can also be transferred quickly and unnoticed to external data carriers via export functions.<\/p>\n<p>With Halocore, Secude offers an intelligent software solution that controls the export of data from SAP systems. Based on company-wide data classification, rights for data exports from SAP can be individually determined, the download of particularly sensitive data can be restricted, and clear tracking of all data transactions can be performed.<\/p>\n<p>Close collaboration with Microsoft also ensures that popular Office applications recognize and automatically apply the security classifications of individual files.<\/p>\n<p>Data exported by users to an Excel file and saved on an external data carrier cannot be opened by third parties with Secude solutions.<\/p>\n<p>In combination with SAP's on-board tools and professional virus protection software, this creates effective protection - both for accidental data loss due to a lost USB stick and for hacker attacks via malware.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/partners\/secude-gmbh\/\"><img loading=\"lazy\" decoding=\"async\" title=\"Security risk usb-stick\" class=\"aligncenter wp-image-11377 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg\" alt=\"https:\/\/e3mag.com\/partners\/secude-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>The recent headlines about the discovery of a USB stick containing unencrypted data about surveillance cameras, escape routes and police patrols at Heathrow Airport clearly show what can happen when such sensitive information falls into the wrong hands.  <\/p>","protected":false},"author":355,"featured_media":31737,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,19171],"tags":[17715,236,5977],"coauthors":[23277],"class_list":["post-31736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag-1712","tag-halocore","tag-sap","tag-secude","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",400,222,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-768x427.jpg",768,427,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-100x56.jpg",100,56,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-480x267.jpg",480,267,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-640x356.jpg",640,356,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-720x400.jpg",720,400,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-960x534.jpg",960,534,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",18,10,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",600,334,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",600,334,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die aktuellen Schlagzeilen \u00fcber den Fund eines USB-Sticks mit unverschl\u00fcsselten Daten \u00fcber \u00dcberwachungskameras, Fluchtwege und Polizeipatrouillen des Heathrow Airport zeigen deutlich, was passieren kann, wenn derart sensible Informationen in die falschen H\u00e4nde geraten.  <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1712\/\" rel=\"category tag\">MAG 17-12<\/a>","author_info_v2":{"name":"Holger H\u00fcgel, Secude","url":"https:\/\/e3mag.com\/en\/author\/holger-huegel\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/31736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=31736"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/31736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/31737"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=31736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=31736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=31736"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=31736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}