...

Security Awareness Presentations

The threat of USB dropping involves installing malware via undetected USB sticks.
NFIR beeldmerk kleur
NFIR beeldmerk kleur

Security Awareness Presentations

The threat of USB dropping involves installing malware via undetected USB sticks.

There is a keychain with a USB stick in the cafeteria. Who does the keychain belong to, who leaves it here unattended? Looking at what it says is then a natural reaction. A human reaction that can carry great risks. Attackers can use social engineering techniques to arouse a victim’s curiosity or greed and encourage him to insert the USB Stick into the computer by an unsuspecting person. People often do not consider the dangers of an (infected) USB Stick

Security Awareness Presentations

USB dropping: a dangerous cyber threat

USB dropping is a cyber threat that is still current. Once the USB flash drive is inserted into the victim’s computer, malicious files can, in certain circumstances, be automatically downloaded onto the device without any interaction from the victim.

What is the purpose of our USB drop action?

The goal of this attack is to install malicious software, such as malware, on the victim’s computer and gain access to their system. In some cases, a signal that the USB drive has been inserted into the computer and the files opened is sufficient for the client.

Our USB drop action simulates a real attack on your organization. During this attack, insight is gained into how this attack is responded to and what the possible consequences could be of a successful attack. It provides a great starting point to increase employee resilience and raise awareness levels.

Organizations can protect against USB Drop attacks by training employees to increase awareness of the dangers.

In a USB drop, the following research questions are formulated:

  • Are employees informed and aware of the dangers of a USB flash drive?
  • Do employees know the rules about, of, for using USB sticks?
  • Are any employees putting the USB stick in the computer and opening the files on the USB stick?
    And if so, how many.
  • Will the USB flash drive be opened if found in a specific location?
    Consider the difference between a USB drive left in the parking lot and a USB drive on a desk.

The USB stick is often combined with a mystery guest visit. It is also possible to send the USB flash drive by mail. Together with you, we can adapt the research questions and tailor the USB drop action more to your organization. Contact our social engineering account managers using the button below.

Become resilient against the most common technique used by cybercriminals

Become resilient against the most common technique used by cybercriminals

Also check out our other security awareness services

SECURITY INCIDENT BIJ UW ORGANISATIE?

De volgende 30 minuten zijn van cruciaal belang​!

De eerste 30 minuten na een cyber security incident zijn cruciaal, omdat een snelle en adequate reactie de schade kan beperken. Daarnaast kan verdere verspreiding van de aanval worden voorkomen en kan essentieel bewijsmateriaal veiliggesteld worden voor nader onderzoek.

Ons Computer Emergency Response Team (CERT) staat 24/7 klaar om bedrijven en organisaties te ondersteunen bij IT-beveiligingsincidenten.

Heeft uw bedrijf professionele hulp nodig bij een beveiligingsincident? 

* LET OP: Wij werken uitsluitend voor bedrijven en organisaties.

SECURITY INCIDENT AT YOUR ORGANIZATION?

The next 30 minutes are crucial!

The first 30 minutes after a cyber security incident are crucial because a quick and adequate response can limit the damage. In addition, further spread of the attack can be prevented and essential evidence can be secured for further investigation.

Our Computer Emergency Response Team (CERT) is available 24/7 to support businesses and organizations during IT security incidents.

Does your company need professional help with a security incident?

* PLEASE NOTE: We work exclusively for companies and organizations.