Skip to Main Content
With the proliferation of removable media devices, such as iPods and USB drives, large amounts of an organization's sensitive data can easily be removed. The author explores the complexities of protecting networks against removable media, including guidelines for purchasing encryption software. This article examines how to develop portable and removable media security policies, as well as how encryption can assist in authenticating, authorizing, and auditing removable media devices.
Date of Publication: July-Aug. 2007