Alternatively, your defense must be the use of appropriate physical security and sound security practices for the computer. Not only are you at risk from data thieves who might use the USB port, but those who would use floppy disks. You're also vulnerable to those who might, once they have physical access to the machine, reboot to another operating system, use the password your user has ever-so-conveniently written down on a Post-it note, and transfer data from this machine via the Internet to some other location.
Dig Deeper on Peripheral device management
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.