One thing that appears to be glossed over is how easy this device makes hijacking data from organizations. High-speed, tons of storage, and inconspicuous.
This underscores the importance of having proper access controls and alerts in place to identify anomalous data access.
This underscores the importance of having proper access controls and alerts in place to identify anomalous data access.