A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server.
Which of the following is the BEST method to prevent future occurrences?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
The BEST method to prevent future occurrences of sensitive data being stolen by a contractor who plugs a flash drive into a server is option D: Restrict usage of flash drives in company policy.
Explanation: A flash drive is a type of removable storage device that can easily be used to copy data from a server to a personal device. To prevent unauthorized access to sensitive data, it is essential to restrict the usage of flash drives by employees and contractors. This can be done by including a clause in the company's policy that restricts the use of external storage devices such as flash drives.
Option A: Disabling any unused physical ports until needed is a good security practice to limit the number of entry points to the server. However, it might not be effective in preventing unauthorized access through physical ports that are required for legitimate business purposes.
Option B: Implementing a BIOS password on all the servers is a good security practice to restrict unauthorized access to the server's BIOS settings. However, this may not prevent unauthorized access to sensitive data if the user has legitimate access to the server and can bypass the BIOS password.
Option C: Installing chassis locks on all the servers is a good physical security practice to prevent unauthorized physical access to the server. However, this may not prevent unauthorized access to sensitive data if the user has legitimate access to the server and can copy the data to a personal device using a flash drive or other external storage devices.
In summary, restricting the usage of flash drives in the company policy is the BEST method to prevent future occurrences of sensitive data being stolen by a contractor who plugs a flash drive into a server.