Most security experts agree that you should secure all your online accounts with two-step verification when you can. It’s an important additional usb access control security feature that requires you to have access to a physical item (typically, a mobile phone) to gain access to your online accounts.
Considering hardware-based encryption for USB drives is best practice, and it will certainly help the organisation comply with the many privacy laws and regulations that now cover the handling of personally identifiable information. In 2013, researchers with Germany’s Fraunhofer Institute for Communication, Information Processing, and Ergonomics devised a technique that used inaudible audio signals to covertly transmit keystrokes and other sensitive data from air-gapped machines. protect usb doesn’t need to be installed on your PC either – you can install it directly onto your external drive. I’d say you’d have to be just as concerned about made in USA” memory sticks. And plus, the issue isn’t the site of manufacture alone. If the memory stick or another usb device is intercepted and loaded with bad firmware along the way, you’re just as screwed.
Readers following along wanting to know where all the risks are can get a thorough treatment here That’s the framework I’ve used for years in high assurance security work, which you can freely distribute so long as you give credit. It also discusses secure code vs secure systems as it was original topic in that usb lock thread. The subjects who at least tried to protect themselves took these steps, though the researchers said they did so ineffectually. All of the above companies reacted immediately. Kingston offered replacement drives with a different security architecture. SanDisk, Verbatim, and Trek released patches.