This new Autorun file is then designed to automatically launch the virus, and infect any computer the next (and every) time the USB stick is inserted into a PC.
System administrators should always disable autorun on all PC’s to protect themselves (which can be achieved quite easily via Group Policy), however there is a problem;
Disabling autorun in Windows has a knock on effect of seemingly disabling all Hardware Encrypted devices, so they appear to users as to be not working.
For SafeToGo, DataLocker or Kingston DTVP-M drives, this means that the application that unlocks the storage partition is not able to run, and so the user cannot enter their password to unlock their drive without manually executing the program.
SafeToGo, DataLocker, SafeStick and Kingston Enabling Autorun Tool
BlockMaster have addressed this by creating a special tool, which can be deployed seamlessly through active directory group policy.
This tool allows Windows autorun to be disabled as per best security practice, but allows authorised SafeConsoleReady drives to be recognised and initialised, and so the end user experience is maintained.
DataLocker / SafeStoGo Active Malware Protection
All drives feature full, active, non-bypassable anti-malware protection built in at no extra cost.
It is impossible for any SafeConsoleReady drive to become infected by any USB malware, virus or worm which attempts to alter the Autorun.inf file.
There are no other Hardware Encrypted Device that have this in-built anti-malware feature.
Enforce Port Control
Softek always recommend that System Administrators use a comprehensive port control solution such as CoSoSys to granularly control their portable data environment.