{"id":48811,"date":"2023-08-16T14:00:40","date_gmt":"2023-08-16T18:00:40","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48811"},"modified":"2023-08-16T14:00:40","modified_gmt":"2023-08-16T18:00:40","slug":"information-security-gadgets","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/information-security-gadgets\/48811\/","title":{"rendered":"Information security gadgets"},"content":{"rendered":"<p>In this blog we usually discuss software solutions for information security. But one of the important aspects of cybersecurity is various measures aimed at preventing physical access to data and devices that contain it. Here, of course, there is no doing without hardware. So, here I overview several categories of gadgets for data protection at the physical level.<\/p>\n<h2>Port locks for connectors<\/h2>\n<p>Connectors pose a major physical security problem. Anyone passing by could plug in something interesting. A hardware keylogger, a malware-infected flash drive, or even their own computer. And it\u2019s hard to prevent, since connectors are literally everywhere.<\/p>\n<p>Hard, but not impossible: there are <a href=\"https:\/\/smartkeeper.us\/port-locks\/\" target=\"_blank\" rel=\"nofollow noopener\">special locks<\/a> that help to protect almost any connector in your hardware zoo: USB (of any type, including USB-C), 8P8C (RJ-45 on the vendor\u2019s site, but we <a href=\"https:\/\/en.wikipedia.org\/wiki\/Modular_connector#8P8C\" target=\"_blank\" rel=\"nofollow noopener\">know better<\/a>) and 6P6C (popularly known as RJ-11), SFP and QSFP, DB-9 and DB-25 serial ports, memory card slots, display connectors, and so on.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/otjTKvLXf3E?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Besides security plugs for empty ports, there are locks for connectors that are constantly in use. They protect against the physical disconnection of something from a computer or, say, a router (for stealing or replacing with malicious device).<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/kPxV9n5yWdU?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>In a nutshell, if you\u2019ve long wanted total control over all your connectors, but had no idea on how to approach it, now you know.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/TPl-a2KbYQU?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Among similar gadgets, we could mention <a href=\"https:\/\/www.navilock.de\/produkt\/20647\/merkmale.html\" target=\"_blank\" rel=\"nofollow noopener\">devices for protecting USB flash drives<\/a> that allow you to lock the USB connector and literally chain the drive to something. Such devices will not, of course, help against the determined thief, but will deter the opportunist passerby from removing your flash drive with one deft hand movement.<\/p>\n<h2>Kensington lock<\/h2>\n<p>Not everyone has heard of the Kensington Security Slot, aka Kensington lock \u2014 an anti-theft system for computer equipment. It can often be found on laptops, dock stations, desktops, and monitors.<\/p>\n<div id=\"attachment_48813\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48813\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16134828\/information-security-gadgets-1-scaled-1-scaled.jpg\" alt=\"Kensington Security Slot on a laptop\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-48813\"><p id=\"caption-attachment-48813\" class=\"wp-caption-text\">An inconspicuous hole on the side of a laptop used to attach a Kensington lock<\/p><\/div>\n<p>Again, we can\u2019t say that the Kensington lock provides 100% protection against theft \u2014 special tools can defeat it. However, it makes stealing equipment a bit harder for the untrained criminal. It\u2019s also particularly effective against casual thieves who cannot thwart the temptation to steal expensive devices that happen to be left unattended.<\/p>\n<div id=\"attachment_48814\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48814\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16134931\/information-security-gadgets-2-scaled-1-scaled.jpg\" alt=\"Laptop secured with a Kensington lock\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-48814\"><p id=\"caption-attachment-48814\" class=\"wp-caption-text\">Kensington lock in action<\/p><\/div>\n<p>By the way, although the Kensington Security Slot can\u2019t be found on Apple devices anymore, there are special gadgets for <a href=\"https:\/\/www.kensington.com\/p\/products\/technology-device-security-products\/surface-locks\/laptop-locking-station-2.0\/\" target=\"_blank\" rel=\"nofollow noopener\">MacBooks<\/a> and <a href=\"https:\/\/www.kensington.com\/p\/products\/technology-device-security-products\/desktop-security-lock\/safedome-mounted-lock-stand-for-imac\/\" target=\"_blank\" rel=\"nofollow noopener\">iMacs<\/a> that add this capability.<\/p>\n<h2>Anti-spy screen protectors<\/h2>\n<p>If you\u2019re worried about people peering over your (or your employee\u2019s) shoulder, there\u2019s good news: you can protect against this, too. This is what special polarizing screens are for. These protective filters reduce the viewing angle to such an extent that only someone sitting directly in front of the screen can see the display.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/q0YEHMpMplk?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>There are polarizing screens not just for laptops, but for smartphones and tablets as well.<\/p>\n<h2>Faraday cages of every creed<\/h2>\n<p>In today\u2019s world, there is no escape from wireless technologies and related threats, like completely contactless data interception, relay attacks, radio tracking, or even electromagnetic pulses that can destroy information. However, there are so-called Faraday cages that can block electromagnetic radiation and thus defend against such threats.<\/p>\n<p>\u201cCage\u201d is a slight misnomer: in reality, it can be a \u201cFaraday envelope\u201d, \u201cFaraday wallet\u201d, \u201cFaraday bag\u201d or whatever, depending on what you want to protect: a portable hard drive from external exposure, a contactless card from relay attacks, a phone from cell-tower triangulation, and so on.<\/p>\n<p>Among the various products you can buy are \u201cFaraday fabrics\u201d. These you can use to build your own shielded container of any size and shape.<\/p>\n<div id=\"attachment_48815\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48815\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16135034\/information-security-gadgets-3-scaled-1-scaled.jpg\" alt=\"Fabric for blocking radio signals\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-48815\"><p id=\"caption-attachment-48815\" class=\"wp-caption-text\">Faraday fabrics are designed to block electromagnetic radiation<\/p><\/div>\n<h2>Anti-peeping covers for webcams<\/h2>\n<p>The problem of malware and websites spying on users through the webcam <a href=\"https:\/\/www.wired.com\/story\/zoom-bug-webcam-hackers\/\" target=\"_blank\" rel=\"nofollow noopener\">pops up<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-paid-75k-for-bugs-letting-sites-hijack-iphone-cameras\/\" target=\"_blank\" rel=\"nofollow noopener\">all too<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/screencastify-chrome-extension-flaws-allow-webcam-hijacks\/\" target=\"_blank\" rel=\"nofollow noopener\">regularly<\/a>. Sure, there are software-based fixes for the issue, but for maximum peace of mind, the best way is to physically cover the camera lens. A few years ago, Mark Zuckerberg\u2019s MacBook drew attention to itself for having tape over <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/jun\/22\/mark-zuckerberg-tape-webcam-microphone-facebook\" target=\"_blank\" rel=\"nofollow noopener\">not only the webcam but also the microphone<\/a>.<\/p>\n<p>Instead of duct tape, you can apply a more elegant solution: a special shutter to cover the webcam. This offers reliable anti-peeping protection with one hand motion. And if the camera is needed, the same hand motion will make it available for use. Any online marketplace will sell such covers for a pittance.<\/p>\n<div id=\"attachment_48816\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48816\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16135447\/information-security-gadgets-4-scaled-1-scaled.jpg\" alt=\"Webcam shutter\" width=\"3000\" height=\"1999\" class=\"size-full wp-image-48816\"><p id=\"caption-attachment-48816\" class=\"wp-caption-text\">Solve the peeping problem with a webcam cover<\/p><\/div>\n<h2>Bluetooth tags for locking Windows<\/h2>\n<p>Many people aren\u2019t in the habit of locking their computer when they step away from it. But it\u2019s one that all employees should develop, of course. To get the ball rolling, it\u2019s worth telling them about several ways to lock a computer quickly and painlessly. And to be on the safe side, ask them to use the dynamic computer locking feature, which appeared last year in Windows 10 and 11.<\/p>\n<p>This feature is aptly named \u201cDynamic Lock\u201d. It uses Bluetooth to lock the computer automatically if the device paired with it moves away. Microsoft\u2019s intention was for this device to be a smartphone. But there is a drawback: some people don\u2019t always take their phones when they leave their workplaces.<\/p>\n<div id=\"attachment_48817\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48817\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/08\/16135539\/information-security-gadgets-5-scaled-1-scaled.jpg\" alt=\"How to set up Dynamic Lock in Windows 10\" width=\"3000\" height=\"1699\" class=\"size-full wp-image-48817\"><p id=\"caption-attachment-48817\" class=\"wp-caption-text\">Dynamic Lock appeared in Windows 10 and 11 last year<\/p><\/div>\n<p>So, instead of a smartphone, a special tag that can be attached to, say, a keychain would be more suitable in some cases. Often such tags double up as a <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-two-factor-authentication\/48446\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication device<\/a>, increasing security on two fronts at once. Here are a <a href=\"https:\/\/hideez.com\/en-eu\/pages\/smart-lock-hideez\" target=\"_blank\" rel=\"nofollow noopener\">couple<\/a> of <a href=\"https:\/\/gatekeeperhelp.zendesk.com\/hc\/en-us\/articles\/360024162133-What-is-GateKeeper-Proximity-\" target=\"_blank\" rel=\"nofollow noopener\">examples <\/a>of such devices.<\/p>\n<h2>Build employee security awareness<\/h2>\n<p>It goes without saying that any security measures and solutions depend directly on the human factor. It is imperative that company employees understand the information security implications of their actions, and know where to expect threats from and, ideally, how to respond to incidents.<\/p>\n<p>That means raising awareness of potential threats and ways to counter them. Our <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Automated Security Awareness Platform<\/a> is the perfect tool for building cybersecurity awareness.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Gadgets to help protect employees\u2019 devices against hackers and other threats.<\/p>\n","protected":false},"author":2726,"featured_media":48812,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[2507,999,4430,4016,43,97,4277],"class_list":{"0":"post-48811","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-awareness","11":"tag-gadgets","12":"tag-kaspersky-asap","13":"tag-physical-security","14":"tag-privacy","15":"tag-security-2","16":"tag-video-surveillance"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/information-security-gadgets\/48811\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/information-security-gadgets\/26090\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/information-security-gadgets\/21553\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/information-security-gadgets\/28784\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/information-security-gadgets\/26399\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/information-security-gadgets\/26616\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/information-security-gadgets\/29087\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/information-security-gadgets\/35879\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/information-security-gadgets\/21677\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/information-security-gadgets\/30414\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/information-security-gadgets\/26680\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/information-security-gadgets\/32389\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/information-security-gadgets\/32057\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/physical-security\/","name":"physical security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48811"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48811\/revisions"}],"predecessor-version":[{"id":48818,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48811\/revisions\/48818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48812"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}