External drives and cold storage continue to be widely used technologies, giving organizations the ability to keep their business data safe from external threats such as ransomware. But what about the internal threats of rogue employees and compromised user accounts?
How do organizations ensure that those devices (and related ports) don’t get misused and abused — especially when there are 10s of thousands of users, each potentially with multiple external devices?