/
All Behaviours > Doesn't plug unknown devices into work devices
Doesn't plug unknown devices into work devices
Malicious USB (or other plug-in) devices can be used in cyber attacks. They can be used to upload malware, steal data or allow criminals to access a network. Unknown devices found at or near a place of work should be handed to IT/Security team.
Why is it important?
USB devices can carry malware and can physically damage a device if plugged in. Other devices such as keyboards and mouses can also carry such payloads. They're effective because they can be plugged directly into target systems and can avoid detection due to their innocent appearance.
Priority Tier
Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.
Risk Mitigated
Malware Infection
Malware infections occur when malicious software makes its way on to a device or network.
Data Theft
Data theft is the intentional stealing of data.
Further reading
https://www.ncsc.gov.uk/collection/mobile-device-guidance/using-peripherals-securely https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security/the-10-steps/removable-media-controls