/>
X
Why you can trust ZDNet
Our recommendations are based on many hours of testing, research, and comparison shopping. We may earn a commission when you purchase a product through our links. This helps support our work but does not influence what we write about or the price you pay. Our editors thoroughly review and fact check every article. Our process

'ZDNet Recommends': What exactly does it mean?

ZDNet's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.

When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNet nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.

ZDNet's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.

Close

USB CopyNotify! 1.3

<p> Portable storage media are now a popular infection vector with malware writers. It's easy to see why: email has been flagged as the main source of infection so heavily that it's all too easy to forget old-style threats such as removable media (remember floppy disks?). As a result, basic desktop protection is now often overlooked, not only by home users but also by businesses. </p>
zd-defaultauthor-christian-harris.jpg
Written by Christian Harris on
usbcopynotifylead.jpg
6.5

USB CopyNotify! 1.3

Good
Like
  • Affordable
  • Easy to configure and manage
  • Instant alerting
  • Allows you to block USB ports
Don't Like
  • No group-based access control
  • Can't block devices by class
  • Can't save profiles and logs of device usage to a SQL server

Portable storage media are now a popular infection vector with malware writers. It's easy to see why: email has been flagged as the main source of infection so heavily that it's all too easy to forget old-style threats such as removable media (remember floppy disks?). As a result, basic desktop protection is now often overlooked, not only by home users but also by businesses.

USB CopyNotify!, from CygNET Systems, is an affordable software utility designed to plug data leaks from the unauthorised use of USB devices, such as mobile phones, digital cameras and digital audio players. Flash drives are a particular threat because they are small and easily carried into office, plugged into a computer and used to copy confidential data without detection, thus rendering established data security measures vulnerable.

Of course, there's plenty of enterprise software for handling data security, but these products are generally too costly and too complex for small companies with few (or no) IT staff. By contrast, USB CopyNotify! doesn't require complex setup and management.

Compatible with 32-bit editions of Windows 2000/XP/2003/and Vista, USB CopyNotify! v.1.3 is simple to install, although it does require a server to receive alerts and notifications generated by the software. The client also needs to be installed on all the computers to be monitored. Unfortunately there's no mass-deployment option, so you'll need to install the software on each client system individually.

As soon as any USB devices are used on any USB CopyNotify!-enabled system, the server receives a notification in the form of a pop-up balloon in the system tray. An audio file can also be played. USB usage alerts can be forwarded via email, while events logged by the server (date, time, computer name, IP address, category, message) are saved as a TXT file. A filter allows you to decide which alerts and notifications you receive, and whether you wish to see them in the desktop pop-up, log file or email.

Top ZDNet Reviews

Raspberry Pi 4
raspberry-pi-4-model-b-header.jpg

Top ZDNet Reviews

Raspberry Pi 4

9
Motorola Moto G100
motorola-moto-g100-header.jpg

Top ZDNet Reviews

Motorola Moto G100

8
Raspberry Pi 400
raspberry-pi-400-header.jpg

Top ZDNet Reviews

Raspberry Pi 400

8.5
OnePlus Watch
oneplus-watch-3.jpg

Top ZDNet Reviews

OnePlus Watch

5.7

Pop-up notification of USB device activity in the USBCopyNotify! server's system tray.

The pop-up balloon contains details such as the computer name into which the USB device was inserted, its IP address, the USB device description plus operational details. You can then directly block the USB port or specify an action such as running an executable file on activation of a particular alert. The software also monitors data copy operations on USB drives and generates a log entry of any files that are copied. Most users will not even notice the agent, although an experienced user could spot the service running in the background. Luckily, a warning is delivered if the CopyNotify! program itself is shut down or uninstalled.

USBCopyNotify! is straightforward to set up and manage, although its functionality is limited

The latest release of USB CopyNotify! also addresses energy conservation. As well as guarding against data leaks, it also sends alerts when computers are left idle and could be switched off to reduce electricity bills. It's a small enhancement, but it's good to see a feature that helps to reduce an organisation's carbon footprint.

USB CopyNotify! is designed for small businesses that are concerned about the theft of confidential data but are unwilling or unable to implement sophisticated data security solutions. However, it's worth spelling out this product's deficiencies. You can't set policies and protection levels for specific type of computers or departments, for example. This means that administrators can't configure which users are given access to portable storage devices. Nor can you control data flow to and from storage devices on a user-by-user basis over the network. Logging is also basic and doesn't allow you to log all user-based portable device activity to a Microsoft SQL server to generate activity trends and reports based on this data.

To be fair, USB CopyNotify! makes all this clear from the outset. For small businesses looking for simplicity it's a good buy, but managers of larger networks should consider stepping up to something like GFI's EndPointSecurity.

 

Related

Netgear Orbi Quad-Band Mesh WiFi 6E System (RBKE963): Fast but expensive wireless mesh networking
netgear-orbi-wifi-6e-rbke963-header.jpg

Netgear Orbi Quad-Band Mesh WiFi 6E System (RBKE963): Fast but expensive wireless mesh networking

Networking
NexDock 360 Touch review: Transform your Samsung smartphone into a capable laptop
nexdock-360-5.jpg

NexDock 360 Touch review: Transform your Samsung smartphone into a capable laptop

Mobility
Dell XPS 17 9710 (2021) review: A highly configurable premium 17-inch laptop
dell-xps-17-9710-header.jpg

Dell XPS 17 9710 (2021) review: A highly configurable premium 17-inch laptop

Laptops