Wednesday, November 3, 2010

Security Laptop-go 'of my laptop?

Laptops are very beautiful. They are comfortable, mobile, powerful and prestigious.
They are also thief magnets. More than 400,000 laptops disappear each year, asking their owners, where did they go, what happens to their data and what to do next.
Some of the laptops are just lost - left in taxis, hotels, restaurants and at conferences and events. Many of these laptops (but not all) find their way back to their owners happy.
Some are stolen from people - manyto employees, servants or to use a "moment of opportunity" - who just want a laptop.
Some are professional "Laptop Lifters" who may work in teams to steal the laptop stolen to be resold.
And others are stolen, not for the same laptop, which can be a bonus, but the data on the hard disk of the laptop - financial or identity data or business plans or data.
For example:


Qualcomm's CEO had his laptop stolen while he was conducting a pressConference. As reported, Qualcomm were some of the most important secrets on that laptop is not encrypted, and easily circumvented by a password protected only.
A State Department laptop with information on the high spread of nuclear weapons stolen from the law of the state headquarters. Two administrators were fired and other officers were disciplined.

Think about it - What other equipment or personal property, we want to carry around routine is worth a thousandDollars, in itself, and can be worth thousands more in data? Why is not that attractive to thieves?
Much of the problem is less on the hardware or software end of things is the human side of things. By raising our awareness many of the vulnerabilities can be greatly reduced.
There are 3 areas of vulnerability: Reverse 1) setting the current portable computer, 2) to protect data, 3) Getting the laptop.

1) that secure the laptop real
There are many ways to controlphysical security of a laptop.

There are hollow blocks that are connected to a fixed object, make it difficult to pick only on laptops, and can leave. Although this cable can be cut with shears, some with an alarm that sounds when the cable is cut together.

Alarms or motion detectors without cable locks. Can be set to activate when the laptop is moved or when the laptop is a certain distance from a movementpocket receiver that has the owners, who also warned the owner.
http://www.anchorpad.com, http://www.kensington.com, http://www.computersecurity.com, http://www.pcguardian.com, http://www.trackitcorp.com, http://www.minatronics.com

Use a laptop carrying bag that looks like a laptop bag. With a laptop bag that IBM or Sony is advertising that it is a very valuable asset, he says. Consider a backpack with your laptop in a padded sleeve. One oftop positions for the theft of the laptop is men's toilets at airports and convention centers. Another area of first-class notebooks are stolen, with phones and paper currency in the occupied zone.

Just as the pickpocket teams from which it draws from the "event" to trigger, while the other steals your wallet, there are "portable lifts" one of them accidentally spilled something on you, while the other walks away with your laptop . A good rule is: whenever there's a branch near you, putYour hand on your laptop.

People usually feel comfortable at conferences and conventions. Finally, you are usually surrounded by their peers, and there is often the Convention to ensure the security personnel around. Often the theft is controlled by the second or third day, as no IDs for the narrow entrance, and many of the visitors who do not wear their badges. Many times people leave laptops unattended while on or under conference tablesBreaks.

Although it is not your laptop is stolen, the PCMIA card - modem or wireless connections - can be stolen in an instant. This is not only a loss of value, is also a real disadvantage.

It 's a good idea to affect the company information displayed on the outside of the notebook and their bags. This makes it less attractive to the thief, because it is easy to identify and makes it harder to sell. With a large and extraordinarily colorful luggage taginsured makes it less attractive because thieves like "invisible".

You should also necessarily be a small card, recording with your laptop to send. Sometimes a laptop was stolen to be returned to the manufacturer for repair by the person who had innocently bought by the thief. You may get your laptop in this way.

Leave your laptop in the car. If you can see, you may lose your laptop and the need for damage to your car to pay. Car Hireare often the target of thieves special, especially to restaurants and shopping malls. In addition, extreme temperatures (hot and cold), can fry your laptop or freeze the LCD screen.

2) data security

Losing it means that your laptop may have to shell out the $ 1,000 - $ 3,000 for a new one. Data loss can be much more serious. Many people only have a laptop, so that all data on it. Also, many people make their data as often asshould.

Data exchange can be a pain. But you lose the personal data, including perhaps your social security number, PIN numbers, credit card info etc. to a form of personal hell.

Here are the steps you should:

Set a BIOS password. BIOS is the first program to load when you turn on your computer. Your laptop will not boot at all to enter this password. While there are ways around this are (there are all sorts of information on the 'net), the first inmultiple layers of protection you can institute. (See http://www.lockdown.co.uk/?pg=biospsw&s=articles see how a BIOS password).

Use the NTFS file system (assuming you use XP). NTFS has a strong encryption capabilities are not FAT or FAT32. Here are some elements which could help to decide: http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/ http://windows.about.com/od/filesfoldersdisks/l/aa001231b.htm convertfat. MSPX

Prevent dataLoss from the infrared port. Did you know that the infrared port? Have you even if you have one? If you have a wish, you may be violated at the computer all the way across the room! An easy way to do the same is a piece of black electrical tape placed over her. (This is a small dark box, usually on the back of your laptop). Alternatively, you can completely disable the infrared port. Since every laptop manufacturer has different stages, research on Google or Yahoo for "DisableInfrared Port "and add the name of your computer manufacturer for research.

Back up your data before leaving the office. So if your laptop is lost or stolen, not to lose your files.

Consider keeping confidential files from the hard disk of the laptop. A DVD can have several gigabytes of data and can be carried in your pocket. A USB storage device is also very practical.

If you are using XP Pro, you can get the data using EFS (Encrypting File System) is encrypted so thatunreadable without the decryption key. If you do not have the Pro version you can buy third-party encryption software. |

3) How your laptop back.

So the worst has happened and your laptop is gone. We hope that you have your name and phone number at any point, you can get back to you, if just left in a taxi.

If you take the right measures are taken before he disappeared, there's a good chance to go back.

Here's what you can do toincreases the likelihood of getting it again:

There are software solutions that allow you to track your laptop if you ever connect to the Internet to allow. For example, http://www.computrace.com/ the IP address from which you are connected on your laptop. The cost is less than $ 50. Get the police to go and recover your laptop is another story, though.

According to some reports, to cooperate when the police, is to restore up to 90%!

All in all, the most effective preventive awareness among users.As previously reported, auditing firm Arthur Andersen has not only classes and posters on the laptop (and other) security, but also a place roving security personnel unattended laptops, cell phones, wallets and PDAs from the benches, and other places not so sure that a note behind telling the unfortunate "victim" where to get their property back. A real education, and probably very effective in raising awareness!

© Steve Freedman, Archer Strategic Alliances 2005 All rights reserved

No comments:

Post a Comment