February 27, 2022
Removable media is any type of storage device you can remove from a computer while the system is running. As marketing, public relations, and communications employees, the amount of files you have on your computer probably exceeds the amount of storage available. To store this excess data, you use a removable media device, such as a flash drive, SD card, or other hard drive.
Audio: Listen to this article.
To prevent your computer from getting hacked and your information being exposed, there’s something you must remember.
The One Thing to Remember about Removable Media:
- Only use technology from trusted sources.
If you use removable media, make sure it comes from a reliable source. If you don’t, your information could be exposed and stolen, and your files could be lost and hacked. If you want to use a flash drive you found in the office, don’t immediately put it into your computer. Clarify with colleagues that the removable media is for use in the office. If the removable media has any suspicious markings, symbols, or anything else strange about it, report it and ask someone before sticking it in your computer.
Removable media can have malicious software embedded within it that allows access to your computer. Even without suspicious markings or symbols, there can be hacking software embedded in any removable media device you find that isn’t from a trusted source.
To help prevent this form of hacking from occurring, you can protect yourself by downloading anti-virus software, deleting any information or data off your computer once it's expired or no longer useful, using a data blocker, and setting strong passwords.
Is your company concerned about a data breach from removable media? A corporate communications professional at Axia Public Relations can help your company communicate internally and externally before, during, and after a cyberattack. You can also download our e-book about Managing Public Relations in a Crisis for additional advice and steps.
This post about removable media is number five in a series of eight posts on cybersecurity for strategic communications professionals. Click to view the previous post "What PR pros need to know about phishing and ransomware" or the next post "What PR pros need to know about vishing and cyber security awareness" in the series.