If you’re reading this, you’ve likely just scanned our card QR code at an event, and you are now holding a small device, wondering about the message: “THE DUNGEON OF PUBLIC PORTS AWAITS.” It’s a playful nod to a serious issue, and that little device is your key to navigating it safely.
Let’s descend into the dungeon.
The threat of juice jacking
The “dungeon” we’re talking about is the growing network of public USB charging stations you find everywhere. We’ve all seen them at airports, hotels, coffee shops, and conference halls. While they seem like a helpful convenience when your battery is low, they can hide a nasty threat called “juice jacking.”
Juice jacking is a cyberattack where criminals compromise these public USB ports. Because a standard USB cable is designed to transfer both power and data, an attacker can use a modified port to either steal sensitive information from your device or install persistent malware. Within seconds of plugging in your device, your passwords, contacts, and financial data could be at risk. It’s a threat so real that government agencies like the U.S. Army Cyber Command have issued public warnings about it.
Your protector: USB data blocker
This is where your new “protector” comes in. The device you’re holding is a USB data blocker. Sometimes called a “USB condom,” its function is brilliantly simple. When you plug it between your charging cable and a public USB port, it physically blocks the data-transfer pins while leaving the power pins connected.
Think of it as a one-way filter: it allows power to flow into your device but makes it physically impossible for any data to be sent or received. It’s a simple, effective tool that lets you charge your phone or tablet with peace of mind.
More than just swag: A symbol of our philosophy
So, why is a digital signage company giving away personal security gadgets? Because we’re tired of useless corporate swag. Instead of another pen or stress ball destined for a desk drawer, we wanted to give you something genuinely helpful.
More importantly, this data blocker is a physical representation of our core philosophy at Screenly. We believe security shouldn’t be an afterthought or a feature you bolt on later. It should be proactive, practical, and built into the very DNA of a product. This focus on security is what drives every decision we make, whether we’re designing a small giveaway item or a global digital signage network.
Security at scale: How Screenly protects your screens
Just as we want to help you protect your phone, we apply our rigorous, security-first mindset to protecting our customers’ digital signs. An unsecured screen in a public space is an attractive target for attackers looking to cause brand damage or use it as a gateway into a corporate network. That’s why organizations in security-critical fields like banking and healthcare trust Screenly.
Our security strategy includes multiple layers of protection for your digital signs:
Hardened players: Our digital signage players are built like fortresses. We use advanced process isolation to create “digital walls” inside the device, so even if one part is compromised, the rest of the system remains safe. All software and OS updates are cryptographically signed, ensuring only legitimate code from Screenly can run. We also lock down our players by default, eliminating open ports and default credentials, which are the most common vectors for IoT attacks.
Secure communications: All traffic between a Screenly Player and our backend is fully encrypted using Mutual TLS (mTLS). This means both the player and the server must prove their identities to each other before any communication happens, preventing man-in-the-middle attacks.
A resilient backend: Our cloud infrastructure is ephemeral, meaning our servers are short-lived and replaced with fully patched versions every 24 hours. This drastically shrinks the window of opportunity for any potential attacker.
We are proud that security is at the core of our development, and our team continues to work hard to provide the most secure digital signage hardware and software on the market.
The gold standard: SOC II Type 2 compliance
Don’t just take our word for it. Screenly is SOC II Type 2 compliant. This isn’t a one-time checklist; it’s a rigorous, ongoing audit by an independent third party. With SOC II Type 2 compliance, our security controls are not only designed with best practices but are operating effectively over time. It’s the ultimate proof of our commitment to keeping your content, your screens, and your network secure.
From the USB data blocker in your hand to the enterprise-grade security architecture protecting thousands of screens worldwide, our mission is the same: to provide security you can trust.
Ready to see how secure digital signage can transform your business? Start your free 14-day Screenly trial today.