User Privileges

User PrivilegesUser Privileges is the term used for the level of access to online resources. Permission negligence threatens the integrity of business data and the security of the network.

Strategic management is vital. Exercised well, strong controls will bolster the security of the business for very little cost. The following suggestions can reduce the likelihood of an incident caused accidentally or deliberately via excessive privilege, and prevent escalation of a breach. Click the image to download our 'Tips to Manage User Privileges'.

Asset Management Benefits

Wasset image.JPGith staff mobility, offsite working and even personal devices in the mix, you may find yourself in a whirlwind of uncertainty as to the whereabouts of equipment belonging to your organisation. Losing control of your assets could have catastrophic repercussions, especially if that includes devices that access business data.

An asset management system will eradicate uncertainty. Always know what equipment the business owns, where it is located and with whom, all in real-time and in one centralised place. Whichever system you choose, you will reap the benefits. Click the image to read our 'Asset Management Benefits'.

How to Disable USB Ports 

USB iage

Removable media can be used to infect a network with malware or used to steal data from the network (and not just by a malicious actor but an insider source), so block the USB ports that connect removable media to a device.

PDSC has provided 3 options that will help with this. When choosing an option consider the equipment you regularly connect to, such as keyboard/ mouse/ mic/ camera/ Bluetooth nano receiver/ etc.

Click the image to find out more about the three options.

How to Disable USB Ports with Inbuilt Configuration


You can block USB ports from the device itself. It would be best to use Technical Support for this option but if you want to give it a go here are basic steps for Windows and Mac implementation.

These examples disable ALL USB ports and must be configured as an administrator. More complex methods will increase your device security.

Regularly test the settings are still in place, especially when there is a new Operating System update, as this might undo the configurations. Click the image to read 'how to disable USB ports with inbuilt configuration'.

Do’s and Don’ts on using removable media

Removable media, such as USB devices, external hard drives, CDs and memory cards, are frequently used by businesses to store data and information. However, they pose a risk of allowing malware to be introduced into a device/system or exporting sensitive data out of an otherwise secure network, whether it is done deliberately or accidentally. Every business must have clear guidelines for the handling of removable media, compatible with proper security controls to protect the organisation’s data.

Here are PDSC’s Do’s and Don’ts when using removable media:


Develop and implement a security policy to control the use of removable media. This ensures your staff are informed of all the responsibilities implicit in the use of removable devices at work. Consider including this in staff’s induction training
Limit the use of removable media. When using removable media to support a business requirement, allocate devices to employees on a case-by-case basis. By restricting the use of removable media you are protecting your network from a potential breach.
Keep an inventory of all removable media and a record of users. Equally important as identifying who has been issued with a removable device is recording when it has been returned. Review this list regularly to be certain of the whereabouts of your devices and where your business data is stored.
If sensitive data is stored on removable media, the device should be encrypted. If encryption is not possible, ensure that the device has appropriate physical protection e.g. is stored in a secure cabinet.
Rigorously manage the reuse and disposal of removable media. Appropriate steps need to be taken when removable media is to be reused or destroyed to ensure that previously stored data becomes inaccessible. You will need to consider how to effectively sanitise a device depending on the sensitivity of the data it previously held.
It is important to scan all removable media for malware. This should be done automatically when any device, whether old or new, is introduced into the network system.


Never connect any removable media device to your computer that you do not trust or recognise. These devices may be carrying malware and, if connected, it could infect not only the device but the whole network.
Do not leave removable media devices unattended. Lost or stolen devices could result in the loss and/or compromise of your data stored on it. Always store removable media in a secure place.
Do not store work data on your personal devices. ALWAYS keep your personal and work devices separate.
Do not use removable media as a default method to store or transfer information between devices, especially when dealing with sensitive data. Consider using physically secure data back-up, such as corporate storage or cloud-based storage.

Removable Media Videos

Removable media | How to safeguard your organisation

Removable media | The problems with removable media

Further Resources