You are running into a risk of data breaching if you don’t care who is accessing your data systems or sensitive IT zones. A malicious person just needs a flash drive to get his hands on your sensitive data.
What to Do?
- Limit the access
- Don’t permit outsider or unauthorized person to use your system.
- A technician from other firm should be provided general PC or he should be supervised during the tasks.
- Lock your computer up after when it is unattended
- Create a sound BYOD policy