Shopping for stronger USB port control? Some criteria to consider when it’s time to rein in thumb drives and other pesky critters USB ports are a fact of life in modern IT–which means they are also a headache for every IT manager.“You’ve got to live with USB ports, and you’ve got to secure them,” says Ari Tammam, VP of alliances at Promisec, a maker of endpoint control software. “I don’t think you can get away with blocking them for everyone.”The USB port control native to Windows XP and Windows Server 2003 is extremely limited. You can disable ports or render them read-only, but finer control over allowed devices or file types is lacking. However, there are a number of third-party applications that give you control over your USB ports with varying degrees of granularity.One of the features of the USB hardware specification is that each device tells the system what kind of device it is as part of the connection process. Some manufacturers take advantage of this to let you block specific kinds of devices on specific ports. For instance, you might opt to allow a USB mouse on any port, but never allow thumb drives. But remember, the principle of least privilege applies with a vengeance to USB ports. Generally, the question shouldn’t be “what do you want to block?”; it’s “what do you want to allow?” Some manufacturers go much further with the controls they allow, and let you require “a specific device with a specific serial number linked to a specific user” to use a particular port, says Gil Sever, CEO of the endpoint security tools manufacturer Safend. You might also mark certain devices as read-only or specify which kinds of files can be read and written through a given USB port. This helps prevent two security risks: someone loading rogue programs into the system through the port, or someone taking out unauthorized kinds of data. For example, a user may be authorized to download Excel (.xls) or Word (.doc) files, but not database files.Some products also block USB ports at the OS level–that is, they become part of the connection process and won’t allow specific kinds of devices to connect on any port on the network. Others will only allow certain specific devices while blocking other devices of that class. Thus the user can download files to, say, the disk drive in her laptop, but to no other USB disk drive. Alternately, you could set things up such that only a thumb drive encrypted with corporate-approved encryption and registered to a specific user could be allowed. When shopping for a USB protector, the major things to look for are ease of management and granularity. Because a typical network will have thousands of USB ports, you probably want to be able to manage all of them in a single central location. Ideally, you’ll want something that allows you to manage the ports on a Windows network through the group policy feature or something equally seamless. A few products have the ability to manage the ports on all the networks in the enterprise rather than having to manage each network separately.Of course USB port control isn’t the be-all and end-all of security, nor can you absolutely guarantee that data can’t be leaked out USB ports. But then that’s true of any other endpoint in the network as well. The point is to do what you can to mitigate the risks of these pesky but oftentimes useful devices.Rick Cook is a freelance writer based in Phoenix. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe