5 types of data theft you should know to prevent

The truth is that data security is a complex and difficult issue. If you think your data is completely safe, there may be holes that you don't know. That is why it is important to know how data is stolen from a computer or network device for appropriate responses.

Have you done your data security so no one can steal data from your computer or network device? If so, it would be great because you have just solved the worst security problem that plagues corporations around the world.

The truth is that data security is a complex and difficult issue. If you think your data is completely safe, there may be holes that you don't know. That is why it is important to know how data is stolen from a computer or network device for appropriate responses.

1. USB stick

Compact USB devices fit in a pocket or hang on a key chain. It is small, easy to hide and can even be disguised, but these USB flash sticks are full of high security risks.

5 types of data theft you should know to prevent Picture 15 types of data theft you should know to prevent Picture 1

For example, they may be lost or stolen, although these USB devices don't seem to have data, but with recovery software, the confidential information you store on it can be discovered. There are also malicious software for USB that provides worms and Trojans to infect computers, waiting to steal login information and sensitive data.

  1. How to remove Trojan, Virus, Worm or Malware?

USB sticks have the same appearance, making it especially susceptible to confusion in the work environment. A colleague can easily pick up your USB to take home.

If you can unlock the computer, you only need a USB stick, anyone can steal data from the computer by plugging it in, transferring data to USB, removing and leaving. This process is easy, even easier than stealing paper documents.

Tech giant IBM has adopted a new security policy in 2018: an order banning the use of removable storage devices such as USB sticks, SD cards and flash drives but seems to be too late.

  1. 3 ways to password protect USB drive data

2. Smartphone or tablet

5 types of data theft you should know to prevent Picture 25 types of data theft you should know to prevent Picture 2

Although it has banned the use of USB storage devices, IBM has not limited the use of other popular mobile storage media such as mobile phones. When set up in large storage mode, a phone can become a portable hard drive or USB drive.

Tablets and MP3 players can also be used in the same way. For IBM users, this may be the solution for not being able to use a USB drive. Perhaps the company realizes that they can detect which data has been transferred from which device and know the identity of the phone user whose USB devices are not.

Either way, anyone can copy data from an unlocked computer, not monitored by a phone and a USB cable.

3. Flash memory card

5 types of data theft you should know to prevent Picture 35 types of data theft you should know to prevent Picture 3

Flash memory cards smaller than a USB stick can be used to stealthily steal data. Many devices today have a card reader feature, which often activates media inserted into the edge of the reader, making them difficult to detect.

With a USB flash device, these small memory cards can be easily pocketed, but the computer must be open and unattended to be able to steal data. For example, a friend uses your computer to view photos from camera memory cards. Although they may not intend to steal data, the malware may get into the computer from the card. And all risks from USB sticks can occur with flash memory cards.

4. NAS device or portable HDD hard drive

5 types of data theft you should know to prevent Picture 45 types of data theft you should know to prevent Picture 4

Some risks of stealing other computer data come from portable hard drives (HDD). They can easily be connected via USB. However, there is another type of drive that offers a higher risk to your data.

Network Attached Storage is increasingly popular as a means of storing data on a local network, usually at home. NAS boxes are affordable and can provide data recovery capabilities, you can even build yourself using Raspberry Pi.

  1. 20 great applications from micro-Raspberry Pi computers

The problem is, if you are storing all your important data on a NAS box, there is a risk that this data will be stolen. It is smaller than a personal computer, can easily connect from home network and perform data theft. Fortunately, you have a solution here: leave the NAS box out of reach, it's best to lock it.

5. Other mobile storage media

5 types of data theft you should know to prevent Picture 55 types of data theft you should know to prevent Picture 5

We have reviewed the most popular compact storage media today, but there are a number of other media such as CD, DVD, ZIP and REV. These types of discs are smaller than portable hard drives and are easy to hide.

Although not widely used, tape media (tape media) is used to store large volumes, backup and restore data in businesses and some home servers. . These media should be kept in a safe place because they usually keep a copy of the entire contents of the server.

How to secure and protect data

What data do you often store on your computer: video games, artwork, a badly written novel or more valuable information such as customer data, commercially sensitive information or information if Revealed you may lose your job.

If you are worried that this information is stolen from your home computer or work laptop, it is important to know how the data is stolen to take appropriate precautions. As mentioned above, your data is at risk of being stolen from:

  1. USB stick.
  2. Smart phones, tablets and MP3 players (connected via USB).
  3. Flash memory card.
  4. NAS equipment and portable HDD.
  5. Mobile media: optical disc, portable hard disk drive, magnetic tape storage device.

If you want to secure the data, you can consider using drive encryption. If your boss requires remote work on centralized data storage, you should set up VPN, which will significantly improve data security.

One last thing: although these devices can be used to steal data from your computer, they can also be used to bring Trojans and malware to computers. Ensure updates of anti-virus and Internet security software.

See more:

  1. Some common data security measures
  2. 10 simple ways to protect data and accounts
  3. Create virtual partitions to protect important data
4.5 ★ | 2 Vote