Contact us today!

FRS Pros Blog

USB PC Killer Terrorizes Private College

USB PC Killer Terrorizes Private College

Network security is a priority for modern organizations of all kinds… after all, threats don’t often discriminate between the computer networks that they try to access. One kind of organization that should be especially diligent is the modern college or university. There are many different kinds of sensitive data stored there, including the personal, medical, and financial trifecta, along with intellectual property.

Unfortunately, sometimes diligence isn’t enough, as exemplified by recent events at the College of Saint Rose in Albany, NY. The capital-based college was struck in early April 2019 by a rash of computer vandalism. Vishwanath Akuthota, a postgraduate alum, pled guilty to charges of using a device known as a USB Killer to permanently disable 59 Windows campus computers, as well as seven Apple computers. This act ultimately cost the college a total of $58,371 to replace these devices.

Akuthota, an Indian national in the United States on a student visa, used his iPhone to film himself using USB Killer to destroy the computers. As a result, he faces a $250,000 fine and ten years in prison.

Understanding USB Killer

USB Killer is a specially made thumb drive that draws power from the USB port, charging a capacitor within the device, then releasing that power back into the USB port. This overloads the components, burning them out and breaking the machine. The USB Killer is freely available online, apparently intended to be used as a surge protection test.

Where Your Biggest Risk Lies

Naturally, no business looks to have this kind of catastrophe happen. Unfortunately, USB Killer is particularly difficult to resist - but that doesn’t mean that there aren’t things you can do to help prevent the various kinds of employee-related security breaches. An independent study revealed that, in 2018, over two-thirds of data breaches were the result of an employee’s actions - whether they were negligent in their duties, were directly responsible for the data theft, or actively sabotaged the company.

That’s right - your employees are the ones who are most likely to put your business at risk. Now, this is not to say that your employees are actively working against you - only a quarter of data breaches were caused by the actions of employees, either current or former - but you still need to keep your network and infrastructure protected against the kinds of situations that could put your data at risk through the actions of your team.

How to Keep Your IT Protected from Your Staff’s Actions

The best way to approach these kinds of issues is to identify and mitigate them before they have an effect. This will require a two-fold approach: for your staff to be properly trained, and for you to have the tools necessary to monitor your business’ technology.

This is to help cover all of your bases. The better your staff is trained, the more prepared they will be to properly utilize the solutions you provide them with, making fewer and less severe errors as a result. However, the better your staff is trained, the more willing they will likely be to take liberties with these systems - liberties that they wouldn’t have otherwise. A comprehensive monitoring strategy will help you to keep your business, its infrastructure, and its data safe and productive.

To learn more about protecting your business through proper staff training and security solutions, reach out to the team at FRS Pros by calling 561-795-2000.

Tip of the Week: Rely Less on Your Printer
None of VoIP’s Issues Are Enough to Prevent You fr...

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Network Security Business Computing Privacy Internet User Tips Hackers Software Google Cloud Microsoft Hardware Innovation Efficiency Business Management Data Computer Hosted Solutions Windows 10 Communication Email Smartphones Tech Term Mobile Devices IT Services Cybersecurity Data Backup IT Support Malware Backup Business Android Office 365 Data Recovery Small Business Upgrade Disaster Recovery Workplace Tips Smartphone Browser Outsourced IT Windows VoIP Internet of Things Gadgets Communications Cloud Computing Apps Users Data Security Collaboration Business Continuity Phishing Information Automation Cybercrime Network Saving Money Ransomware Managed IT Services Managed Service Mobile Device Management Microsoft Office Miscellaneous Operating System Facebook Blockchain Two-factor Authentication Vulnerability Money Artificial Intelligence OneNote Alert Passwords Law Enforcement Social Media Server Health Employer-Employee Relationship Quick Tips Best Practice Applications Wireless Spam Chrome Holiday Networking Managed IT Services Mobile Office Virtualization IT Support Managed IT Access Control App Google Drive Settings Printing Password Bring Your Own Device Hacking Windows 10 Data Storage Retail Gmail Save Money Computers Mobile Device Information Technology Word Conferencing Windows 7 Project Management Patch Management Managed Service Provider Bandwidth Telephone Systems Data Breach Unsupported Software Augmented Reality Tech Support BYOD Router Travel Commerce WannaCry File Sharing Application Telephony Hosted Solution Excel Search Fraud Encryption Avoiding Downtime Mobility Safety Mobile Security Evernote SaaS Vendor Proactive IT Google Assistant User Error Going Green Social Hybrid Cloud Paperless Office Touchscreen Risk Management WiFi Cortana Voice over Internet Protocol Government Data Loss Robot Wi-Fi Update Budget Business Technology Audit Politics Wireless Technology Meetings The Internet of Things Google Docs Shortcut Software as a Service Data Protection Wireless Charging Remote Workers VPN iPhone Devices Hard Drive Display Data Management Human Resources BDR Productivity Cost Management IT Management History Sports Payment Cards Marketing Microsoft Word Financial Payroll Chromecast Sabotage Troubleshooting Specifications Virus Camera Myths Legal Management Copiers Employees Business Intelligence IT Solutions Telephone Managed Services Provider Apple Internet Exlporer Employee ROI Internet Service Provider Webinar Antivirus Transportation Tablets Maintenance Security Cameras PC CRM Consultant Laptop Sales Proactive Projects Threats Sync PowerPoint Admin Inventory Remote Monitoring Storage Social Engineering Battery Uninterrupted Power Supply OneDrive Digital Signage Private Cloud Hyperlink Facebook Privacy Edge Instant Messaging Hacker Break/Fix Windows Server 2008 R2 IT solutions FAQ NFL eWaste Emergency Machine Learning AI Touchpad Websites Identity Printers Scams Wireless Internet Saving Time Identities Point of Sale Employee-Employer Relationship Firewall iOS WIndows Server 2008 Entertainment Value Wasting Time Files eCommerce Ciminal Keyboard DDoS Medical IT Windows 10s HBO Charger Computer Care Nanotechnology Device Security Amazon Recovery Downtime Smartwatch HIPAA Screen Mirroring Humor Data Theft Identity Theft Data Privacy Disaster Virtual Private Network Adobe Workers Gamification Keyboard Shortcuts Hosted Desktop Unified Threat Management Legislation Language Office Processor Accessory Fiber Optics 5G Development Solid State Drive Personal Information Root Cause Analysis Windows Ink Virtual Assistant E-Commerce Administrator Server Maintenance Remote Work Emails Cast Gifts Computing Vendor Management Reputation Licensing Updates Memory Streaming Media Smart Devices Upgrades Comparison Scam Lithium-ion battery Testing Benchmarks Computer Fan Computer Forensics Peripheral Holidays Data storage Microsoft Excel IT budget Education YouTube Micrsosoft Hard Disk Drive Outlook Co-Managed Services Managed IT Service Remote Computing Google Maps Spyware Alexa for Business Access Investment Net Neutrality Credit Cards App store Samsung Chromebook Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship es Phone System Cache Benefits Congratulations Save Time Office tips Computer Accessories Training Monitors Flexibility Music Advertising Smart Technology Television CrashOverride Compliance Company Culture Scalability Analytics Communitications End of Support Regulation HaaS Relocation Black Market Cleaning Big Data Automobile Twitter Managing Stress USB Worker How To Books PDF Video Games Experience Hiring/Firing Thank You Mobile Computing Virtual Reality Work/Life Balance