Seven Things Solution Providers Must Know About Data Breaches

Connectivity, USB Cards Can Be Security Liabilities

Containment is essential to preventing a successful attack from spreading, Kon said, and can be as simple as pulling an internet cable out of a device or closing systems that a company doesn't promptly need to access. 

Yet even a disconnected device can be vulnerable, Kon said, citing USB cards that spread viruses to computer terminals in Iraq. To defend against an infected USB card, Kon said companies can disable the cards or only allow them to be plugged into certain terminals.

Ultimately, Kon said the effort is largely centered around anticipating and blocking potential security loopholes.