Block Users From Connecting Cell Phones to a PC

With AccessPatrol you can block cell phones from connecting to Windows computers.

Protect sensitive data against illicit transfers to iPhones, Blackberries, PDAs, and other mobile devices used by employees in the workplace.

  • Stop Data Theft to Storage Devices
  • Get Insights Into File Transfers
  • Stay Protected On Any Network

Trusted by

Cushing Terrell Logo
HBCS Revenue Cycle Logo
HBCS Revenue Cycle Logo
Morris, Manning, and Martin LLP Logo
Viking Yachts Logo

& many more

Trusted by

HBCS Revenue Cycle Logo
VES Veteran Evaluation Services Logo
Viking Yachts Logo

& many more

Why Should I Block Cell Phones from Connecting to Computers?

The use of personal cell phones in the workplace is not just a distraction, they are also a high-risk device that needs to be addressed as part of your endpoint security policy.

Data security risks of cell phones

  • Data Exfiltration: Unless you assign read-only access to mobile devices, employees can connect their phones to their workstations and illicitly transfer data to their smartphone’s microSD card or internal storage.
  • Mobile Malware: Worms, trojans, and other malicious software can be unknowingly transferred to and from mobile devices. All it takes is an employee with Full Access permissions to plug their compromised device into their computer for the attack to begin.
A woman uses her phone and laptop simultaneously
AccessPatrol peripheral device permissions mockup block usb

How to Protect Data Against Mobile Devices With AccessPatrol

  • Disable Bluetooth on workstations to prevent wireless data transfers to cell phones
  • Block cell phones, iPods, PDAs, and other mobile devices from connecting to computers
  • Monitor device reports and removable media file transfer logs for suspicious behavior
  • Provide employees with alternatives for charging their phones such as USB ports in wall outlets and power bars
Access Patrol

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s USB Control & Data Loss Prevention Features

Block USB

Block USB & Other Devices

Set full access, read only or no access on storage devices

Allowed List

Whitelist USB Devices

Allow only authorized storage devices to be used

Block Files

Block File Transfers

Prevent files from being transferred to portable storage

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices


DLP Activity Reports

Track file transfers, storage device use, file operations, and more

Track File Transfers

File Transfer Monitoring

Monitor files that are copied to USBs, cloud storage, and more

Email Alert

Alerts & Reports

Automatically send USB activity reports to designated inboxes


Transparent & Stealth Modes

Run silently in the background or provide notice of monitoring

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite security policies to computers running outside the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server


Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.