Compromised USB drives interacting with the corporate network can result in heavy damages to enterprises. System administrators need to define the right USB security management policies to identify known devices, restrict unknown devices and identify the data that is being transferred through using the USB drives
0