Peripheral devices are fueling a growing trend of security breaches, information leakage and data theft inside and outside networked environments. Many such devices can operate at a level of sophistication comparable to servers and workstations, but receive little attention where security and monitoring is concerned. Peripheral devices provide alternate pathways into and out of protected environments. Organizations are experiencing great difficulty in defining, enforcing and securing peripheral device policies across heterogeneous networks and computing assets. This paper highlights some of the most widely used peripheral devices, the potential security threats and how to thwart them.