Contact us today!

FRS Pros Blog

USB PC Killer Terrorizes Private College

USB PC Killer Terrorizes Private College

Network security is a priority for modern organizations of all kinds… after all, threats don’t often discriminate between the computer networks that they try to access. One kind of organization that should be especially diligent is the modern college or university. There are many different kinds of sensitive data stored there, including the personal, medical, and financial trifecta, along with intellectual property.

Unfortunately, sometimes diligence isn’t enough, as exemplified by recent events at the College of Saint Rose in Albany, NY. The capital-based college was struck in early April 2019 by a rash of computer vandalism. Vishwanath Akuthota, a postgraduate alum, pled guilty to charges of using a device known as a USB Killer to permanently disable 59 Windows campus computers, as well as seven Apple computers. This act ultimately cost the college a total of $58,371 to replace these devices.

Akuthota, an Indian national in the United States on a student visa, used his iPhone to film himself using USB Killer to destroy the computers. As a result, he faces a $250,000 fine and ten years in prison.

Understanding USB Killer

USB Killer is a specially made thumb drive that draws power from the USB port, charging a capacitor within the device, then releasing that power back into the USB port. This overloads the components, burning them out and breaking the machine. The USB Killer is freely available online, apparently intended to be used as a surge protection test.

Where Your Biggest Risk Lies

Naturally, no business looks to have this kind of catastrophe happen. Unfortunately, USB Killer is particularly difficult to resist - but that doesn’t mean that there aren’t things you can do to help prevent the various kinds of employee-related security breaches. An independent study revealed that, in 2018, over two-thirds of data breaches were the result of an employee’s actions - whether they were negligent in their duties, were directly responsible for the data theft, or actively sabotaged the company.

That’s right - your employees are the ones who are most likely to put your business at risk. Now, this is not to say that your employees are actively working against you - only a quarter of data breaches were caused by the actions of employees, either current or former - but you still need to keep your network and infrastructure protected against the kinds of situations that could put your data at risk through the actions of your team.

How to Keep Your IT Protected from Your Staff’s Actions

The best way to approach these kinds of issues is to identify and mitigate them before they have an effect. This will require a two-fold approach: for your staff to be properly trained, and for you to have the tools necessary to monitor your business’ technology.

This is to help cover all of your bases. The better your staff is trained, the more prepared they will be to properly utilize the solutions you provide them with, making fewer and less severe errors as a result. However, the better your staff is trained, the more willing they will likely be to take liberties with these systems - liberties that they wouldn’t have otherwise. A comprehensive monitoring strategy will help you to keep your business, its infrastructure, and its data safe and productive.

To learn more about protecting your business through proper staff training and security solutions, reach out to the team at FRS Pros by calling 561-795-2000.

Tip of the Week: Rely Less on Your Printer
None of VoIP’s Issues Are Enough to Prevent You fr...

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Network Security Business Computing Privacy Internet Google Microsoft Business Management Hackers User Tips Cloud Software Innovation Efficiency Tech Term Mobile Devices Hardware Malware Data Backup Smartphone Computer Hosted Solutions Data Browser Smartphones Windows 10 Data Recovery Office 365 Cybersecurity Upgrade Email Internet of Things Android IT Services Windows Data Security Apps IT Support Outsourced IT Gadgets Backup Workplace Tips Communication Small Business Cybercrime Disaster Recovery Network Operating System VoIP Phishing Communications Mobile Device Management Business Continuity Vulnerability Law Enforcement Ransomware OneNote Server Employer-Employee Relationship Users Business Money Alert Saving Money Miscellaneous Social Media Virtualization Information Collaboration Health Applications Wireless IT Support Best Practice Chrome Automation Managed IT Services Artificial Intelligence Managed IT Services Cloud Computing Spam Passwords Microsoft Office Computers Managed Service Holiday Bring Your Own Device Networking Facebook Router Word Telephone Systems Google Drive Tech Support Managed Service Provider Managed IT BYOD Unsupported Software Blockchain App Windows 10 Two-factor Authentication Information Technology Save Money Proactive IT Evernote SaaS User Error Access Control The Internet of Things Touchscreen Data Storage Budget Risk Management Printing VPN iPhone Wireless Technology Cortana Mobile Security WiFi Data Loss Mobile Device Data Management Conferencing Wi-Fi Google Assistant Hybrid Cloud Productivity Audit Quick Tips Update Google Docs Project Management Shortcut Data Protection Hosted Solution Patch Management Wireless Charging Politics Meetings Sports Avoiding Downtime Mobility Search Devices BDR Windows 7 Telephony IT Management Business Technology Data Breach Cost Management Password Augmented Reality Commerce WannaCry Travel File Sharing Application Hacking Government Excel Fraud Encryption Gmail Robot Safety Financial Payroll Files Storage Social Engineering Battery Camera DDoS Sync Windows Server 2008 R2 Remote Monitoring Edge Instant Messaging Hacker IT solutions Recovery Employees Personal Information FAQ Paperless Office Management Disaster Employee Retail Websites Telephone NFL eWaste Emergency Security Cameras Identities Point of Sale iOS WIndows Server 2008 Projects Reputation Mobile Office Data storage Ciminal Windows 10s HBO Vendor OneDrive Administrator History Charger Smartwatch Entertainment PowerPoint Admin Screen Mirroring Break/Fix Streaming Media Data Theft Identity Theft Computer Care Nanotechnology Lithium-ion battery Hyperlink Remote Computing Device Security Unified Threat Management Machine Learning Legislation Language Office Identity Adobe Workers Development Settings Solid State Drive Employee-Employer Relationship Voice over Internet Protocol Access Server Maintenance Wireless Internet Saving Time Emails Cast Medical IT Chromecast Gifts Computing Vendor Management Root Cause Analysis Value Wasting Time Windows Ink Upgrades Amazon Downtime Laptop Comparison Scam Computer Fan Data Privacy Transportation Licensing Updates Micrsosoft Microsoft Excel IT budget Education Hard Disk Drive Internet Exlporer Private Cloud Outlook Investment Gamification Keyboard Shortcuts Marketing Software as a Service 5G Credit Cards Sabotage App store Samsung Accessory Google Maps Spyware Virtual Assistant E-Commerce Touchpad Specifications Virus Hard Drive Display Uninterrupted Power Supply Going Green Social Microsoft Word Business Intelligence IT Solutions Testing ROI Legal Memory Human Resources Webinar Bandwidth YouTube PC Antivirus Computer Forensics Peripheral Apple Consultant Alexa for Business Payment Cards Humor Sales Proactive Chromebook Co-Managed Services Tablets Maintenance Smart Technology Flexibility Music Television CrashOverride Company Culture PDF Scalability Analytics Keyboard Mobile Computing Compliance Black Market Cleaning Text Messaging Automobile Thank You Printers Big Data Managing Stress Worker Regulation USB Office tips Congratulations How To Books Advertising Hiring/Firing Video Games Experience Virtual Reality Work/Life Balance Twitter Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits es Phone System Cache Save Time HaaS End of Support Computer Accessories Training Monitors Relocation Digital Signage