Some computers are charming. They are convenient, mobile, powerful and prestigious.
are also magnets thief. More than 400000 laptops disappear each year, leaving their owners wondering where he ido, what happens to their data and what the next step.
Some of these laptops were lost? left cabin, hotels, restaurants and conferences and events. Many of these laptops (but not all) find their way back to their owners luck.
Some are stolen by people? many of them co-workers, service personnel or other benefit from an opportunity? who have only one PC.
Some are stolen in the notebook Lifters professionals who can work in teams to steal laptops for resale.
and others are stolen, and not for the laptop itself, which May be a bonus, but the data on your portable hard drive? financial or identity data or plans or data.
For example:
<ul> <li> CEO of QUALCOMM stole his laptop while he was conducting a press conference. Apparently some of QUALCOMM's most precious secrets that are transferable, not only encrypted and protected by a password that is easy to circumvent. A State Department <LI> laptop containing information on high-level nuclear proliferation was stolen from his seat in the state. Two administrators were fired and other personnel were reprimanded. </ ul> Think about it? What other equipment or personal possession to proceed regularly around this value is more than a thousand dollars, by itself, and can be worth thousands more in data? Why not be attractive to thieves?
big part of the problem is less on hardware or software end of things, is the human aspect of things. By raising our awareness many of the vulnerabilities can be greatly reduced.
There are 3 areas of vulnerability: 1) Getting the laptop, 2) data security, 3) Getting the laptop back.
1) To ensure the effectiveness of portable
There are many ways to control physical security on a laptop. It
cable locks that can be attached to an immovable object to make it more difficult to just take the laptop and walk. Despite the fact that these cables can be cut with a bolt cutters, some of them are combined with an alarm that sounds if the cable is cut.
alarms or motion detectors are also available without cable locks. It can be configured to activate when the laptop is moved or when the laptop is moved a certain distance of a pocket receiver that the owner, who is also notify the owner. www.anchorpad.com, www.kensington.com, www.computersecurity.com, www.pcguardian.com, www.trackitcorp.com, www.minatronics.com
with a laptop carrying case that does not resemble not a laptop. Do you have a laptop, said that if IBM or Sony is advertising that carries a very precious. Consider using a backpack with him on his laptop in a padded sleeve. One of the most important places for laptop theft men are bad at airports and convention centers. Another is the first computer is stolen, is that the payphones in an occupied area.
Just as there are teams pickpocket, a distraction that you accidentally hit, while the other steals your wallet, laptop Lifters who has been a spill something for you, while the other will coupled with his laptop. A good rule to follow is this: Whenever there is a diversion near you, put his hand on his laptop.
most people feel comfortable at conferences and conventions. After all, you're usually surrounded by colleagues and is often around the convention staff to ensure confidentiality. Often, the flight will take place in the second or third day, when the identification of entry is not strictly controlled, and many participants not to use their brands. Several times, people leave unprotected on laptops or conference table during breaks.
Although not the laptop is stolen, PCMIA cards? modem or wireless? can be stolen in an instant. Not only is this a loss of value, is also a real disadvantage.
It is a good idea to record information about your business prominently outside of the laptop and in his trial. Do not make it less attractive to thieves, and that makes it easy to identify and make it more difficult to sell. In a large colour or their luggage, security label makes it less attractive for thieves to be invisible.
must also be sure to send the little registration card that came with the laptop. Sometimes a laptop stolen will be returned to the manufacturer for repair of the person who innocently purchased the Great Depression. You can get your laptop in this direction.
Do not leave your laptop in the car. If it is visible, May you lose your laptop and have to pay for damage to his car. Rental cars are often targeted by thieves, especially in restaurants or department stores. In addition, extreme temperatures (hot and cold), you can fry your laptop or freeze the LCD.
2) Data Security
lose your laptop May means you have to Shell to $ 1,000 - $ 3,000 for a new one. The loss of their data can be much more serious. Many people only have a laptop, so that all the data it contains. In addition, as most people do not save your data as often as they should. Replacement
data can be painful. But the loss of their personal data, including perhaps your social security number, PIN, credit card, etc. can be a form of hell.
These are the steps to take: Set a password BIOS
. BIOS is the first program to load when you turn on your computer. The laptop does not start at all before entering the password. Even if there are ways to avoid this problem, (there are all kinds of information on the Net), is the first of several layers of security for the department. (See http://www.lockdown.co.uk/?pg=biospsw&s=articles to see how to set up a password BIOS).
Use NTFS (provided that you use XP). NTFS has a strong capacity for encryption are not available on FAT or FAT32. Here are a couple of items that can help you decide: http://windows.about.com/od/filesfoldersdisks/l/aa001231b.htm http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/ convertfat . mspx
prevent loss of data via the infrared port. Do we really use the infrared port? I do not know if you have one? If you have one, the computer can be cut in all courses across the room! A simple way to disable it is to put a piece of black electrical tape above. (It is a little dark window, usually at the back of the laptop). You can also activate the infrared port completely. Given that each manufacturer of mobile phones have different measures, Google or Yahoo Search for the ability to disable the infrared port and add the laptop manufacturer's name to search words.
a backup copy of your data before leaving his office. Therefore, if your laptop is lost or stolen, you do not lose their case.
consider keeping sensitive files beyond its portable hard drive. A DVD can contain several gigabytes of data and can be carried in a pocket. A USB storage device is also very practical.
If you use XP Pro, you can encrypt the data through its EFI (Encrypting File System), so it would be totally unreadable without the decryption key. If you do not have the Pro version, you can buy one third of encryption. |
3) Preparation of the laptop back.
so the worst thing that happened and your laptop has been lost. Fortunately, you have your name and phone number or any other place, so they can be returned to you if you leave a bus.
If you take the necessary measures before his disappearance, it is a fair chance to remind you.
This is what we can do to improve your chances of return:
It is a program that allows you to track your laptop if it is connected to the Internet. For example, www.computrace.com/ will give you the IP address of your laptop when you're online. The price is less than $ 50. The police and go recover the laptop is another story, however.
According to some reports, when police cooperation, development is up to 90%!
However, the most effective prevention is the user of attention. Reportedly, the CPA Arthur Andersen has not only classes and posters on your laptop (and others), security, but also has security officers who have keys unattended laptops, cell phones, PDAs and bag of offices and other unsecure, leaving behind a note to offer unfortunate there to get their belongings. While teaching, and probably very effective in raising awareness! ? Steve Freedman, archer strategic alliances 2005 All rights reserved Steve Freedman archer strategic alliances http://helpprotectmycomputer.com http://helpprotectmycomputer.com
สมัครสมาชิก:
ส่งความคิดเห็น (Atom)
ไม่มีความคิดเห็น:
แสดงความคิดเห็น