Security Behaviour Database
/
All Behaviours > Doesn't plug unknown devices into work devices

Doesn't plug unknown devices into work devices

Malicious USB (or other plug-in) devices can be used in cyber attacks. They can be used to upload malware, steal data or allow criminals to access a network. Unknown devices found at or near a place of work should be handed to IT/Security team.


Why is it important?

USB devices can carry malware and can physically damage a device if plugged in. Other devices such as keyboards and mouses can also carry such payloads. They're effective because they can be plugged directly into target systems and can avoid detection due to their innocent appearance.

Priority Tier

Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.

Tier 2

Risk Mitigated

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Theft

Data Theft

Data theft is the intentional stealing of data.

Further reading

https://www.ncsc.gov.uk/collection/mobile-device-guidance/using-peripherals-securely https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security/the-10-steps/removable-media-controls

SebDB is brought to you byCybSafe| © 2022 CybSafe Ltd