How to protect yourself against malicious removable media

A man holding a USB drive, a piece of removable media.


Be careful when dealing with removable media from unknown sources

What looks like a harmless piece of removable media can actually be a front to infect your computer with malware.

It’s easy to think that making mistakes on the internet is the only way your cybersecurity can become compromised. Unfortunately, that isn’t so.

Portable hardware is typically used to store data. These devices can include flash drives, external hard drives, and even memory cards, and each can contain viruses or other forms of malware. Of course, you can’t tell by looking at the thing that it’s dangerous, and plugging such devices into your computer or phone could activate the malware, which then causes your device to malfunction.

If you spot a “lost” removable data storage medium, whatever you do, do not plug it into your device. It might legitimately be someone’s lost property … on the other hand, some cybercriminal might have intentionally dropped it in plain sight in hopes of taking advantage of your good intentions.

Even if your intentions are pure and you want to figure out who the owner of the removable storage is and return it to them, plugging it into your computer or phone to figure it out can be all it takes to cause catastrophic damage.

In the video below, Adobe, the National Cyber Security Alliance, and Speechless Inc. demonstrate the possible danger of plugging a removable medium from an unknown source into your device.

Here are some best practices to follow when dealing with these removable media:

  • Don’t insert any external storage media into your device if you don’t know and implicitly trust its source.
  • Make sure your computer always has antivirus and antimalware installed, up to date, and activated.
  • Disable auto-run features on your devices; they can allow harmful programs in the storage media to engage automatically.

For a sturdier cybersecurity arsenal, subscribe to any of our legal packages today.

Contact Us

+1 877-615-1725


Related Articles

The picture shows a fraud thief who is trying to steal information. One's Social Security number, along with an address, is the most valuable piece of information identity thieves can get their hands on.


Key Information Regarding Identity Theft

One's Social Security number, along with an address, is the most valuable piece of information identity thieves can get their hands on.

 image depicting symbols of identity theft


What are the early indicators of identity theft?

Several telltale signs can give away the fact you've been a victim of identity theft early.

data lock


Does the IRS Verify Your Identity?

The IRS can verify your identity if it believes there is fraud related to a tax filing.

A login screen asking for a username and a password.


How Often Should I Update My Online Account Passwords?

Several factors influence when you should be changing your online passwords.

A laptop with the text "cyber security" on its monitor.


Cyber Security: How to Protect Yourself on Social Media

Defend yourself from cyber criminals on social media with strong cyber security practices.

A man downloading a file on his phone.


How to protect yourself against internet downloads

3 tips to keep you safe when downloading files online

View all articles