Hardware Information |
Laptop Security -Where'd My Laptop Go?
Laptops are lovely. They are convenient, mobile, powerful and prestigious.
A large part of the problem is less on the hardware or software end of things, it's in the HUMAN side of things. By raising our awareness many of the vulnerabilities can be greatly lessened. There are 3 areas of vulnerability: 1) Securing the actual laptop, 2) Securing the Data, 3) Getting the laptop back. 1) Securing the actual laptop There are cable locks that can be attached to an immovable object to make it more difficult to just pick up the laptop and walk away. Although these cables can be cut with a bolt cutter, some of them are combined with an alarm that will sound if the cable is cut. Alarms or motion detectors are also available without the cable locks. They can be set to activate whenever the laptop is moved or when the laptop is moved a certain distance away from a pocket receiver that the owner has, which also alerts the owner.www.anchorpad.com, www.kensington.com, www.computersecurity.com, www.pcguardian.com, www.trackitcorp.com, www.minatronics.com Use a laptop carrying bag that does not look like a laptop case. Having a laptop case that says IBM or Sony is advertising that you are carrying a highly valuable commodity. Consider using a backpack with your laptop in it in a padded sleeve. One of the prime places for laptop theft is the men's bathroom in airports and convention centers. Another prime place that laptops are stolen is at pay phones in a busy area. Just as there are pickpocket teams, one of whom distracts you by "accidentally" bumping into you while the other steals your wallet, there are "Laptop Lifters" one of whom will accidentally spill something on you while the other walks off with your laptop. A good rule to follow is: any time there is a diversion near you, put your hand on your laptop. People usually feel comfortable at conferences and conventions. After all, you are usually surrounded by your peers, and there are often convention staff around to provide security. Often the theft will take place on the second or third day, when IDs for entry are not being checked as stringently, and many of the attendees are NOT wearing their badges. Many times people will leave laptops unguarded on or under conference tables during breaks. Even if it is not your laptop that is stolen, your PCMIA cards - modem or wireless connectors - can be stolen in an instant. Not only is this a loss of value, it's also a real inconvenience. It's a good idea to engrave your company information prominently on the outside of the laptop and on its carrying case. It makes it less attractive to the thief, because it makes it easy to identify and makes it harder to sell. Having a large or conspicuously colored luggage tag securely affixed makes it less attractive because thieves like to be "invisible." You also should be sure to send in that little registration card that came with your laptop. Sometimes a stolen laptop will be sent back to the manufacturer for repair by the person who had innocently bought it from the thief. You may get your laptop back this way. Don't leave your laptop in your car. If it is visible, you may lose your laptop AND have to pay for the damage to your car. Rental cars are often the special target of thieves, especially at popular restaurants or shopping malls. Plus, the extremes of temperature (both hot AND cold), can either fry your laptop or freeze the LCD screen. 2) Data Security Losing your laptop may mean you'll have to shell out $1,000 - $3,000 for a new one. Losing your data can be MUCH more serious. Many people ONLY have a laptop, so ALL of their data is on it. Plus, most people don't back up their data as often as they should. Replacing the data can be a pain. But losing your PERSONAL data, including perhaps your Social Security number, PIN numbers, credit card info, etc can be a form of personal hell. Here are the steps you should take: Set a BIOS password. BIOS is the first program to load when you turn on your computer. Your laptop will not boot at all until that password is entered. Although there are ways to bypass this, (there's all kinds of info on the 'Net), it's the first in several layers of security you can institute. (See http://www.lockdown.co.uk/?pg=biospsw&s=articles to see how to set a BIOS password). Use the NTFS file system (assuming you are using XP). NTFS has strong encryption capabilities not available in FAT or FAT32. Here are a couple of articles that might help you decide: http://windows.about.com/od/filesfoldersdisks/l/aa001231b.htm http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/convertfat.mspx Prevent data loss through your Infrared port. Do you actually use your infrared port? Do you even know if you have one? If you do have one, your computer can be hacked into all the way across the room! A simple way to disable it is to put a piece of black electrical tape across it. (It's a little dark window, generally on the back of your laptop). Alternatively you can disable the infrared port completely. Because each laptop manufacturer has different steps, search on Google or Yahoo for "Disable Infrared Port" and add your laptop manufacturer's name to the search terms. Back up your data before you leave your office. That way, if your laptop is lost or stolen, you have not lost your files. Consider keeping sensitive files off your laptop hard drive. A DVD can hold multiple gigabytes of data and can be carried in your pocket. A USB storage device is also quite handy. If you are running XP Pro, your can encrypt your data using EFS (Encrypting File System), so it will be totally unreadable without the decryption key. If you don't have the Pro version, you can purchase third party encryption software.| 3) Getting your laptop back. So the worst has happened and your laptop has disappeared. Hopefully, you have your name and phone number on it somewhere, so it can be returned to you if it was just left in a cab. If you've taken the right steps before it disappeared, there's a fair chance you will get it back. Here's what you can do to increase the chance of getting it back: There are software solutions that allow you to trace your laptop if it ever connects to the Internet. For instance, www.computrace.com/ will give you the IP address wherever your laptop logs on. The cost is under $50. Getting the police to go and recover your laptop is another story, however. According to some reports, when the police cooperate, recovery is up to 90%! © Steve Freedman, Archer Strategic Alliances 2005 All Rights Reserved Steve FreedmanArcher Strategic Allianceshttp://helpprotectmycomputer.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Obsolete Is A Dirty Word (Intel Pentium 64 Bit Microchip) Get ready everyone, home computers are about to set new LAN speed records! The Intel 64-bit microchip will soon be powering the new line of Pentium 4 computers. This long awaited sizzling fast release will be heading to store shelves across America just in time for the new blazing fast Windows 64-bit operating system. 3 Easy Step To Locate A Real Bargain On Laptop Batteries Looking for a real bargain on laptop batteries? How do I know the batteries are running good as advertised? Which merchants are offering quality rechargeable cells? Where can I get the bargain? Where to buy?Many of you have some of these questions? Certainly!!. We surely want to saving our hard to earn $$ and only buy quality cells. Preventing Tape Drive Failure Contrary to popular belief, tape drives are generally robust and reliable. However, there are three common mistakes that people make that dramatically increase the probability of tape drive failure. Ten Things Everyone Should Know about Ordering an Inkjet Cartridge Online It is true. You can save a lot of time and money by ordering your next inkjet cartridge online. Computer Hardware Preventive Maintenance Software Computers often break down at the worst of all times. These problems can be averted, or at least minimized with preventive maintenance. Buying a Plasma or LCD TV FAQs This article focuses on frequently asked questions by buyers of plasma and LCD televisions.Q: Does the "plasma" in plasma televisions need to be recharged or replaced over time?A: No. Special Events Recording in DVD Players Age The proliferation of portable DVD players has dramatically changed the videography approach.Digital era prompted people to make critical choices. Advanced Tips on Speeding Up Your PC Other then keeping your HDD free of viruses, spyware, and ad-ware at all times, there are other methods for speeding up system speed which you may like to employ. One of these is overclocking. Top Three Factors to Consider While Choosing a Data Center for Your Business Data Centers are the core of the Internet. The computer servers that power the Interne,t call Data Centers their home. Expansion Cards Part 3: PCI Express In the first two installments of this series of Tech Tips, we took a look at PCI and AGP, undoubtedly the most common expansion slots in a computer today. With a few key improvements over both of these, PCI Express is destined to replace both and offer a whole new level of computer performance. Ten Tips to Safeguard Your Laptops The following is a list of tips to help safeguard your laptop while traveling or conducting business.1. The Constantly Changing World of Inkjet Technology We have finally advanced to a time when technology can greatly improve graphics and printing. The technology we have at our disposal now is so advanced we are able to produce inkjet printers capable of printing proofs so accurate they can actually represent the end product. Investing On A 1D Bar Code Reader Whereas 2D bar codes offer more security and safety for their subjects, 1D bar codes, as read by 1D bar code readers, are more practical for wide scale operations. The reason? Bar codes with single layers are more affordable to produce than the double layered inscriptions of 2D bar codes. Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 2 Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the second part of a series of articles designed to give you a few suggestions for your next purchase. How To Choose The Best Gaming Laptop The gaming laptop is coming of age! It is steadilyincreasing in popularity as performance quality goes up. Gamers now regularly consider laptops or notebookswhen searching for that perfect gaming machine. Correctional Institution Preventive Maintenance Software There is a great need for preventive maintenance in correctional institutions. The public would be at risk if penal facilities waited to solve problems until after they manifested themselves. An Inexpensive Solution to Securing Public Access Computers Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. A Guide to Refurbished Laptops Computing freedom, independence, and mobility don't have to come with a hefty price tag.Manufacturers refurbish laptop computers that have been returned. Where Can I Find The Best Case Mods Online and Save Money? Are you captivated by the stunning Case Mods you've seen online but shell shocked at some of the prices.What is a case mod, some of you may ask? Have you every wanted to spice up that boring bland box you call your computer?Well you can and there are lots of people online with fantastic clever ideas on themes, gee whiz lights, sounds, and much much more. How to Read Zener Diode Code Many technicians are confused on how to really read a zener diode code. There are many types of code number indicated on it's body. |
home | site map | Contact Us |