Security Behaviour Database
/
All Behaviours > SB032 Does not insert unauthorised devices/media into work devices/network

SB032 Does not insert unauthorised devices/media into work devices/network

Malicious USB (or other plug-in) devices can be used in cyber attacks. They can be used to upload malware, steal data or allow criminals to access a network. Unknown devices found at or near a place of work should be handed to IT/Security team.


Why is it important?

USB devices can carry malware and can physically damage a device if plugged in. Other devices such as keyboards and mouses can also carry such payloads. They're effective because they can be plugged directly into target systems and can avoid detection due to their innocent appearance.

Priority Tier

Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.

Tier 2

Risk Mitigated

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Theft

Data Theft

Data theft is the intentional stealing of data.

Further reading

https://www.ncsc.gov.uk/collection/mobile-device-guidance/using-peripherals-securely

SebDB is brought to you byCybSafe| © 2023 CybSafe Ltd