{"id":22718,"date":"2023-08-16T10:30:35","date_gmt":"2023-08-16T18:30:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/08\/16\/news-16448\/"},"modified":"2023-08-16T10:30:35","modified_gmt":"2023-08-16T18:30:35","slug":"news-16448","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/08\/16\/news-16448\/","title":{"rendered":"Useful gadgets for information security | Kaspersky official blog"},"content":{"rendered":"<p><strong>Credit to Author: Alanna Titterington| Date: Wed, 16 Aug 2023 18:00:40 +0000<\/strong><\/p>\n<p>In this blog we usually discuss software solutions for information security. But one of the important aspects of cybersecurity is various measures aimed at preventing physical access to data and devices that contain it. Here, of course, there is no doing without hardware. So, here I overview several categories of gadgets for data protection at the physical level.<\/p>\n<h2>Port locks for connectors<\/h2>\n<p>Connectors pose a major physical security problem. Anyone passing by could plug in something interesting. A hardware keylogger, a malware-infected flash drive, or even their own computer. And it&#8217;s hard to prevent, since connectors are literally everywhere.<\/p>\n<p>Hard, but not impossible: there are <a href=\"https:\/\/smartkeeper.us\/port-locks\/\" target=\"_blank\" rel=\"nofollow noopener\">special locks<\/a> that help to protect almost any connector in your hardware zoo: USB (of any type, including USB-C), 8P8C (RJ-45 on the vendor&#8217;s site, but we <a href=\"https:\/\/en.wikipedia.org\/wiki\/Modular_connector#8P8C\" target=\"_blank\" rel=\"nofollow noopener\">know better<\/a>) and 6P6C (popularly known as RJ-11), SFP and QSFP, DB-9 and DB-25 serial ports, memory card slots, display connectors, and so on.<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='100%' height='420' src='https:\/\/www.youtube.com\/embed\/otjTKvLXf3E?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' frameborder='0' allowfullscreen='true' style=\"\"><\/iframe><\/span><\/p>\n<p>Besides security plugs for empty ports, there are locks for connectors that are constantly in use. They protect against the physical disconnection of something from a computer or, say, a router (for stealing or replacing with malicious device).<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='100%' height='420' src='https:\/\/www.youtube.com\/embed\/kPxV9n5yWdU?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' frameborder='0' allowfullscreen='true' style=\"\"><\/iframe><\/span><\/p>\n<p>In a nutshell, if you&#8217;ve long wanted total control over all your connectors, but had no idea on how to approach it, now you know.<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='100%' height='420' src='https:\/\/www.youtube.com\/embed\/TPl-a2KbYQU?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' frameborder='0' allowfullscreen='true' style=\"\"><\/iframe><\/span><\/p>\n<p>Among similar gadgets, we could mention <a href=\"https:\/\/www.navilock.de\/produkt\/20647\/merkmale.html\" target=\"_blank\" rel=\"nofollow noopener\">devices for protecting USB flash drives<\/a> that allow you to lock the USB connector and literally chain the drive to something. Such devices will not, of course, help against the determined thief, but will deter the opportunist passerby from removing your flash drive with one deft hand movement.<\/p>\n<h2>Kensington lock<\/h2>\n<p>Not everyone has heard of the Kensington Security Slot, aka Kensington lock \u2014 an anti-theft system for computer equipment. It can often be found on laptops, dock stations, desktops, and monitors.<\/p>\n<div id=\"attachment_48813\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-48813\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16134828\/information-security-gadgets-1-scaled-1-scaled.jpg\" alt=\"Kensington Security Slot on a laptop\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-48813\" \/><\/p>\n<p id=\"caption-attachment-48813\" class=\"wp-caption-text\">An inconspicuous hole on the side of a laptop used to attach a Kensington lock<\/p>\n<\/div>\n<p>Again, we can&#8217;t say that the Kensington lock provides 100% protection against theft \u2014 special tools can defeat it. However, it makes stealing equipment a bit harder for the untrained criminal. It&#8217;s also particularly effective against casual thieves who cannot thwart the temptation to steal expensive devices that happen to be left unattended.<\/p>\n<div id=\"attachment_48814\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-48814\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16134931\/information-security-gadgets-2-scaled-1-scaled.jpg\" alt=\"Laptop secured with a Kensington lock\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-48814\" \/><\/p>\n<p id=\"caption-attachment-48814\" class=\"wp-caption-text\">Kensington lock in action<\/p>\n<\/div>\n<p>By the way, although the Kensington Security Slot can&#8217;t be found on Apple devices anymore, there are special gadgets for <a href=\"https:\/\/www.kensington.com\/p\/products\/technology-device-security-products\/surface-locks\/laptop-locking-station-2.0\/\" target=\"_blank\" rel=\"nofollow noopener\">MacBooks<\/a> and <a href=\"https:\/\/www.kensington.com\/p\/products\/technology-device-security-products\/desktop-security-lock\/safedome-mounted-lock-stand-for-imac\/\" target=\"_blank\" rel=\"nofollow noopener\">iMacs<\/a> that add this capability.<\/p>\n<h2>Anti-spy screen protectors<\/h2>\n<p>If you&#8217;re worried about people peering over your (or your employee&#8217;s) shoulder, there&#8217;s good news: you can protect against this, too. This is what special polarizing screens are for. These protective filters reduce the viewing angle to such an extent that only someone sitting directly in front of the screen can see the display.<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='100%' height='420' src='https:\/\/www.youtube.com\/embed\/q0YEHMpMplk?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' frameborder='0' allowfullscreen='true' style=\"\"><\/iframe><\/span><\/p>\n<p>There are polarizing screens not just for laptops, but for smartphones and tablets as well.<\/p>\n<h2>Faraday cages of every creed<\/h2>\n<p>In today&#8217;s world, there is no escape from wireless technologies and related threats, like completely contactless data interception, relay attacks, radio tracking, or even electromagnetic pulses that can destroy information. However, there are so-called Faraday cages that can block electromagnetic radiation and thus defend against such threats.<\/p>\n<p>&#8220;Cage&#8221; is a slight misnomer: in reality, it can be a &#8220;Faraday envelope&#8221;, &#8220;Faraday wallet&#8221;, &#8220;Faraday bag&#8221; or whatever, depending on what you want to protect: a portable hard drive from external exposure, a contactless card from relay attacks, a phone from cell-tower triangulation, and so on.<\/p>\n<p>Among the various products you can buy are &#8220;Faraday fabrics&#8221;. These you can use to build your own shielded container of any size and shape.<\/p>\n<div id=\"attachment_48815\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-48815\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16135034\/information-security-gadgets-3-scaled-1-scaled.jpg\" alt=\"Fabric for blocking radio signals\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-48815\" \/><\/p>\n<p id=\"caption-attachment-48815\" class=\"wp-caption-text\">Faraday fabrics are designed to block electromagnetic radiation<\/p>\n<\/div>\n<h2>Anti-peeping covers for webcams<\/h2>\n<p>The problem of malware and websites spying on users through the webcam <a href=\"https:\/\/www.wired.com\/story\/zoom-bug-webcam-hackers\/\" target=\"_blank\" rel=\"nofollow noopener\">pops up<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-paid-75k-for-bugs-letting-sites-hijack-iphone-cameras\/\" target=\"_blank\" rel=\"nofollow noopener\">all too<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/screencastify-chrome-extension-flaws-allow-webcam-hijacks\/\" target=\"_blank\" rel=\"nofollow noopener\">regularly<\/a>. Sure, there are software-based fixes for the issue, but for maximum peace of mind, the best way is to physically cover the camera lens. A few years ago, Mark Zuckerberg&#8217;s MacBook drew attention to itself for having tape over <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/jun\/22\/mark-zuckerberg-tape-webcam-microphone-facebook\" target=\"_blank\" rel=\"nofollow noopener\">not only the webcam but also the microphone<\/a>.<\/p>\n<p>Instead of duct tape, you can apply a more elegant solution: a special shutter to cover the webcam. This offers reliable anti-peeping protection with one hand motion. And if the camera is needed, the same hand motion will make it available for use. Any online marketplace will sell such covers for a pittance.<\/p>\n<div id=\"attachment_48816\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-48816\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16135447\/information-security-gadgets-4-scaled-1-scaled.jpg\" alt=\"Webcam shutter\" width=\"3000\" height=\"1999\" class=\"size-full wp-image-48816\" \/><\/p>\n<p id=\"caption-attachment-48816\" class=\"wp-caption-text\">Solve the peeping problem with a webcam cover<\/p>\n<\/div>\n<h2>Bluetooth tags for locking Windows<\/h2>\n<p>Many people aren&#8217;t in the habit of locking their computer when they step away from it. But it&#8217;s one that all employees should develop, of course. To get the ball rolling, it&#8217;s worth telling them about several ways to lock a computer quickly and painlessly. And to be on the safe side, ask them to use the dynamic computer locking feature, which appeared last year in Windows 10 and 11.<\/p>\n<p>This feature is aptly named &#8220;Dynamic Lock&#8221;. It uses Bluetooth to lock the computer automatically if the device paired with it moves away. Microsoft&#8217;s intention was for this device to be a smartphone. But there is a drawback: some people don&#8217;t always take their phones when they leave their workplaces.<\/p>\n<div id=\"attachment_48817\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-48817\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16135539\/information-security-gadgets-5-scaled-1-scaled.jpg\" alt=\"How to set up Dynamic Lock in Windows 10\" width=\"3000\" height=\"1699\" class=\"size-full wp-image-48817\" \/><\/p>\n<p id=\"caption-attachment-48817\" class=\"wp-caption-text\">Dynamic Lock appeared in Windows 10 and 11 last year<\/p>\n<\/div>\n<p>So, instead of a smartphone, a special tag that can be attached to, say, a keychain would be more suitable in some cases. Often such tags double up as a <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-two-factor-authentication\/48446\/\" target=\"_blank\" rel=\"noopener\">two-factor authentication device<\/a>, increasing security on two fronts at once. Here are a <a href=\"https:\/\/hideez.com\/en-eu\/pages\/smart-lock-hideez\" target=\"_blank\" rel=\"nofollow noopener\">couple<\/a> of <a href=\"https:\/\/gatekeeperhelp.zendesk.com\/hc\/en-us\/articles\/360024162133-What-is-GateKeeper-Proximity-\" target=\"_blank\" rel=\"nofollow noopener\">examples <\/a>of such devices.<\/p>\n<h2>Build employee security awareness<\/h2>\n<p>It goes without saying that any security measures and solutions depend directly on the human factor. It is imperative that company employees understand the information security implications of their actions, and know where to expect threats from and, ideally, how to respond to incidents.<\/p>\n<p>That means raising awareness of potential threats and ways to counter them. Our <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\">Automated Security Awareness Platform<\/a> is the perfect tool for building cybersecurity awareness.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/information-security-gadgets\/48811\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16133803\/information-security-gadgets-feature.jpg\"\/><\/p>\n<p><strong>Credit to Author: Alanna Titterington| Date: Wed, 16 Aug 2023 18:00:40 +0000<\/strong><\/p>\n<p>Some tools to increase the physical security of your company\u2019s information infrastructure.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[15496,1001,12177,11520,28981,8638,5897,714,12321,24574],"class_list":["post-22718","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-awareness","tag-business","tag-enterprise","tag-gadgets","tag-kaspersky-asap","tag-physical-security","tag-privacy","tag-security","tag-smb","tag-video-surveillance"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22718"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22718\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}