Verify apps over usb

broken image

However, a more recent development is the move by some companies toward USB keys or tokens to provide authentication security that protects access to enterprise user accounts for websites, software, systems, and networks. This is one of the reasons why some companies have chosen to install computer systems without USB ports, to prevent this kind of connectivity.

broken image

With the widespread adoption of mobile technologies such as smartphones and tablets, companies are already struggling with the trend of ‘bring your own device’ (BYOD), which has resulted in huge numbers of employees bringing mobile devices into the workplace and potentially connecting them to enterprise computers via USB. Now, however, they are faced with an alarming trend that threatens to undo all of those efforts and heighten the risks of viruses and malware that can lead to costly breaches of confidential company data.

broken image
broken image

For many years, data security experts have been campaigning to convince companies not to allow their employees to connect USB sticks or other peripheral USB devices to enterprise computers.