Techopedia Explains Pod Slurping
The phenomenon of pod slurping represents a convergence between the development and adoption of small mobile devices by individual users, and the ongoing liability that corporations and other parties face in trying to safeguard sensitive data. Pod slurping and other kinds of inside hacking or data theft can often be prevented by multi-tier IT security products, but there’s still a big concern around how authorized or trusted employees, contractors or visitors may be able to effectively steal large amounts of information with a relatively simple connection, often a USB connection to a workstation or other hardware component. Because so much of pod slurping and other data theft is done through USB connections, some businesses have started to actually glue their USB ports shut (or otherwise remove them) in order to prevent unauthorized access.
- INFOGRAPHIC: 9 Tips for Keeping Your Internet Use Private
- 5 Ways to Protect Online Privacy
- Data Corrupts - Big Data Corrupts Absolutely
- Common Methods Hackers Are Using To Crack Your Cellular Phone
- Top 3 Wi-Fi Security Vulnerabilities
- Biometrics: New Advances Worth Paying Attention To