CurrentWare v7.0.2 is here! Read the release blog to learn more.

Are Cell Phones Risking Your Cybersecurity?

Cell Phones Risking Cybersecurity

It’s Friday afternoon and in just a few short hours your employees will be making their way out of the office, eagerly venturing off to the exciting weekend ahead of them.

Knowing they have a long commute after leaving, one of your employees decides to charge their cell phone with an office computer’s USB port. Entirely unknown to them, they have just compromised sensitive customer data with a harmful virus that is rapidly spreading across your internal network. 

As a business owner, it is your responsibility to ensure that sensitive customer data is protected. In our ever-evolving technological landscape, hackers are becoming increasingly clever in discovering new methods of acquiring the emails, addresses, and financial details of your customers.

As your organization continues to grow, the potential to cause serious data breaches increases greatly. How can you stay on top of things so that you can focus on what you do best? The answer is implementing an endpoint security plan

removable media policy template mockup

Removable Media
Policy Template

  • Set data security standards for portable storage
  • Define the acceptable use of removable media
  • Inform your users about their security responsibilities

Get started today—Download the FREE template and customize it to fit the needs of your organization.

What is Endpoint Security?

In networking, an “Endpoint” refers to the physical devices connected to your network. This not only includes common devices such as desktops, laptops, and smartphones, but also retail kiosks and POS terminals.

Organizations with corporate data held on endpoint devices can unknowingly cause a serious cybersecurity concern should the data fall into the wrong hands.

Endpoint Security is the practice of ensuring that these ‘endpoints’ are safe from data breaches by preventing the installation of malicious software and the transfer of data to unauthorized devices – this is often accomplished with Endpoint Security Software.

What is Endpoint Security Software?

AccessPatrol is a device control software solution that protects sensitive data against theft to portable storage devices.

AccessPatrol keeps data secure by…

  • Preventing users from stealing data or transferring malicious files with easily concealed USB flash drives
  • Maintaining auditable records of file transfers to portable storage devices, and…
  • Triggering real-time alerts when security policies are violated

AccessPatrol’s central console allows you to apply security policies and run reports on your user’s USB activities from the convenience of a web browser. 

The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.

Here’s an overview of AccessPatrol’s key features.

Under Device Permissions you can assign unique device control policies for specific groups of computers or users. 

AccessPatrol controls a variety of peripherals, including…

  • Storage devices such as USB flash drives and external hard drives
  • Wireless Devices such as Bluetooth, Infrared, and WiFi
  • Communication Ports such as Serial and Parallel ports
  • Imaging Devices such as Scanners or Cameras, and…
  • Other Devices such as network share drives, printers, and mobile phones

Under the allowed list you can specify trusted devices that can be used on your computers.

If you need to temporarily lift device restrictions for devices that aren’t on the allowed list, you can use the access code generator.

This allows you to set a time-limited policy exemption for a specific computer. The access code generator does not require internet access to work, making it the ideal solution for travelling users and other special circumstances.

To further protect sensitive data, AccessPatrol allows you to block file transfers based on file names and extensions. This ensures that even allowed devices can’t transfer sensitive data.

AccessPatrol also includes a variety of USB activity reports to help organizations audit data transfers and peripheral device use.

These reports provide insight into…

  • All files that have been copied, created, renamed, or deleted on USB storage devices, and…
  • A timestamped device history for each user, including attempts to use blocked devices

AccessPatrol’s reports can be generated on-demand, on a set schedule, or automatically sent to your inbox to alert you of specific events.

Don’t let a preventable data leak ruin your organization. Take back control over portable storage devices with a free trial of AccessPatrol.

Get started today by visiting CurrentWare.com/Download

If you have any questions during your evaluation our technical support team is available to help you over a phone call, live chat, or email.

Thank you!

Endpoint Security Software, such as CurrentWare’s AccessPatrol, prevents malware attacks and data breaches by proactively disabling the ability to transfer data and malware from unauthorized devices, increasing network security for businesses of all sizes.

A robust Endpoint Security Software gives you the tools you need to implement a suitable data loss prevention strategy with access to features such as the ability to selectively modify device permissions, block external devices, and protect your valuable data by controlling who has access to it, how it is handled, and where it is stored.

How Can I Get Started?

Device Blocking window Screenshot of CurrentWare's USB device control software AccessPatrol

If you are ready to start taking your company’s data security seriously, our expert team is here to help. Download our full-feature free trial and we can guide you every step of the way.


Companies around the world are falling victim to data breaches and malware attacks because they are not implementing endpoint security software to protect their computers.

AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malware from unauthorized devices, resulting in an increase of network and data security for businesses of all sizes.

Protect your network! Start a FREE 14-day Trial of AccessPatrol Now

Dale Strickland
Dale Strickland
Dale Strickland is the Digital Marketing Manager for CurrentWare, a global provider of user activity monitoring, web filtering, and device control software. Dale’s diverse multimedia background allows him the opportunity to produce a variety of content for CurrentWare including blogs, infographics, videos, eBooks, and social media shareables.