Security being taken to the cleaners

Security appears to be all washed up, as USB sticks with sensitive data are being left regularly in pockets when workers take their clothes to be cleaned at laundrettes.

If you're after sensitive data for any reason, a laundrette could be a great place to go find it.

This is according to a survey from Credant Technologies, who claims that 9,000 USB sticks have been forgotten and left in pockets of clothes taken to dry cleaners.

Thes figures were obtained from phone interviews with 500 dry cleaners across the UK, who found an average of two USB keys per year. Extrapolating this to the 4,500 dry cleaners in the UK leads to the 9,000 figure.

Data sticks are most frequently found in city centres and commuter areas with one proprietor in the City of London finding 80 memory sticks in 2008 alone.

It's not just valuable data that's left in pockets. Other valuable items discovered include a gold Rolex watch and an envelope filled with diamonds.

This follows on from a survey conducted in September last year that found that over six thousand portable devices, such as laptops, mobiles and memory sticks are left in the back of taxis every six months.

The issue that this highlights once again is that devices need to have encryption to protect the data they contain in the highly likely event that they are lost.

A spokeswoman for Credant Technologies told IT PRO that it was the responsibility of companies to ensure that employees took data issues seriously. "Memory keys are a way of life but we're all infallible and they will get lost - in pubs, taxis, laundrettes. [Therefore] you have to take an executive decision to have security guidelines on what can and can't be downloaded [to USB memory sticks]. You need to have a policy in place otherwise it will create a headache. Staff just have to be trained.

"People often think that the data they're carrying isn't valuable but in the wrong hands it can be, so you have to look at it sensibly."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021