
Top 5 Payroll Software Features: Everything You Need to Know
Get up to speed on the essential features of payroll software. Discover the 5 key features that make payroll software a must-have for businesses large and small.
IT Dojo: Disable USB storage under OS X or Windows
IT Dojo: Disable USB storage under OS X or Windows
Length: 09:38 | May 6, 2008
Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.
These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.
If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.
In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.
Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.
Get up to speed on the essential features of payroll software. Discover the 5 key features that make payroll software a must-have for businesses large and small.
Learn how to create and copy SSH keys using just two simple commands. SSH keys provide a secure and convenient way to authenticate remote servers.
Did you know you can set temporary environment variables on the Linux operating system? Learn how to get started with Jack Wallen's video tutorial.
This is a step-by-step guide on how to compare the contents of local and remote files with the help of SSH. Watch our video tutorial to help you learn.
Worried about work data security on your personal Mac? In this article, we'll discuss the best strategies to keep your work data secure on your Mac.
In this video, we provide an in-depth look at ChatGPT. Discover valuable tips and tricks to help you leverage the AI tool to its full potential.
Discover the top five new features coming to Apple’s new iPhone 15.
Learn how to create and use a Docker secret from a file for secure storage of sensitive data with this step-by-step tutorial.