SyncStop - The USB Condom to Protect your mobile phone from accidental syncing and malware - Tubblog: The Hub for MSPs

SyncStop – The USB Condom to Protect your mobile phone from accidental syncing and malware

SyncStop – The USB Condom to Protect your mobile phone from accidental syncing and malware image

Every Friday I share one of my favourite finds of the week — a website, tool or an app that has impressed me.

My Friday Favourite this week is SyncStop – The USB Condom to Protect your mobile phone from accidental syncing and malware.

What is it?

SyncStop by Xipiter is a USB device that prevents data sync when your device is plugged into someone else’s computer or a public charging station.

How can it help me?

I’ve written before about how to protect the data on your laptop or mobile device, but have you ever charged your mobile phone or tablet at a public USB charging station — perhaps in an airport or cafe?

SyncStop USB Condom in a laptop

If so, then you are running the risk of your data being hoovered up. As well as charging your device, the USB port can be used to transfer data to or from your device without your permission. That’s not good!

SyncStop is effectively a USB condom. You plug the SyncStop between your device and the USB cable you are using. SyncStop keeps you safe by blocking the data pins on any USB cable and allowing only power to flow through. This removes the opportunity to steal your data or install malware on your device.

The @SyncStop device works like a USB condom to protect your mobile phone from accidental syncing and malware Click to Tweet

SyncStop works on any USB device.

How much does it cost?

SyncStop costs $12.99.

How can I get it?

SyncStop USB CondomFor buyers in the USA, you can buy SyncStop from the SyncStop Shop.

To find out more, visit the SyncStop webpage or contact the manufacturer of SyncStop, Xipiter. You can also visit the Xipiter Facebook page, or follow @XipiterSec on Twitter.

For buyers in the UK, you might consider buying the PortaPow Fast Charge + Data Block USB Adaptor, which works in the same way.

Thanks to IT Support Engineer Simon Howes for recommending SyncStop to me!

You Might Also Be Interested In

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

Fight Back Against the Hackers with Huntress Security Solutions image

Fight Back Against the Hackers with Huntress Security Solutions

Article | By Stephen McCormick
Complement Your Cybersecurity Strategy with Security Awareness Training image

Complement Your Cybersecurity Strategy with Security Awareness Training

Article | By Stephen McCormick
How A Penetration Test Uncovered Astonishing Network Flaws image

How A Penetration Test Uncovered Astonishing Network Flaws

Artificial Intelligence | By Richard Tubb
Defence in Depth: Better Results From a Layered Security Strategy image

Defence in Depth: Better Results From a Layered Security Strategy

Article | By Stephen McCormick
Phishing Defence Coaching: A Targeted Approach To End-User Security Training image

Phishing Defence Coaching: A Targeted Approach To End-User Security Training

Article | By Stephen McCormick
Understanding Deepfake Technology: Why It’s A Risk To Your Business image

Understanding Deepfake Technology: Why It’s A Risk To Your Business

Article | By Stephen McCormick
Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs image

Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs

Article | By Stephen McCormick
In-House or Outsourced Cybersecurity: What’s Best for MSPs? image

In-House or Outsourced Cybersecurity: What’s Best for MSPs?

Article | By Graham Pierrepoint
Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep image

Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep

Personal Development | By Richard Tubb
Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats image

Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats

Article | By Stephen McCormick
Key Importance of Privacy for MSPs and Clients image

Key Importance of Privacy for MSPs and Clients

Article | By Guest Author
Championing the Cybersecurity Right of Boom and the MSP Revolution image

Championing the Cybersecurity Right of Boom and the MSP Revolution

Article | By Graham Pierrepoint

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore.

Share via
Send this to a friend