Secure use of USB Flash Disks

Flash sticks are typically used to transport data physically with us from one location or workstation to another. The flash sticks may contain information that is sensitive be it business or personal information. Due to the importance of the data we may hold on those sticks it is important to be using them securely.

Some tips :
– Scan any usb stick before opening it on your PC.
– To do that: Go to My Computer.
– Right click on your Flash Disk Icon
– Select Scan for Viruses.
– Make sure you safely remove your USB stick when you are done using them, click on the USB icon in the taskbar and select Eject. This is to protect the data on your USB from being corrupted.

PS: If the data on your flash stick is sensitive make sure you encrypt it so that if it is lost or stolen the data cannot be accessed. Encryption can be done by software. You can download a program like TrueCrypt.

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.