Written by: Jennifer Somers
Image: Computer Hope
When it comes to data breaches, you don’t often see big headlines about stolen laptops but they are a very desirable item to steal….and not just because the thief can sell the laptop.
Laptops provide an easy “in” to a network (along with access to any file saved on the hard drive) and the skill set required to steal a laptop is minimal in comparison to hacking into a network. Depending on how sensitive the information on the laptop is and the security measures in place, the loss incurred by an organization can be much greater than just the cost of replacing a laptop
.
Here are some steps you can take to keep your laptop safe:
Image: Computer Hope
When it comes to data breaches, you don’t often see big headlines about stolen laptops but they are a very desirable item to steal….and not just because the thief can sell the laptop.
Laptops provide an easy “in” to a network (along with access to any file saved on the hard drive) and the skill set required to steal a laptop is minimal in comparison to hacking into a network. Depending on how sensitive the information on the laptop is and the security measures in place, the loss incurred by an organization can be much greater than just the cost of replacing a laptop
.
Here are some steps you can take to keep your laptop safe:
- Use a security cable – use a laptop security cable to secure your laptop when you’re using it in a crowded area.
- Apply a Deterrent label – apply a label with a phrase like “Tracking and Recovery Protection.” Why steal a laptop that is being tracked and you can’t resell?
- Use tracking and recovery software – this allows you to GEO-locate the laptop, remotely delete files, retrieve important files and track the thief.
- Use encryption – once a thief realizes that it will be VERY difficult if not impossible to access your information, he will likely dump your computer and find one that isn’t so much work.
- Backup your data - if you do not recover your laptop, at least you still have access all of your files.