Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Storage

    Preparation Eases Pain of Stolen Laptops

    Written by

    Matt Hines
    Published August 7, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Before the end of the current session, the U.S. House of Representatives is expected to vote on the passage of the Financial Data Protection Act of 2005, which aims for more stringent reporting requirements for businesses that lose or mishandle sensitive customer data. The bill, if passed, is likely to force companies to be more open about technology-related missteps.

      As a result of such legislative efforts, and the publicity from high-profile security breaches among the nations largest businesses and government agencies, business executives are increasingly aware of the threat posed by stolen or misplaced laptops, and the scrutiny they will face from customers, partners and regulators when data stored on missing devices has not been appropriately protected.

      The recent theft of a laptop owned by the Department of Veterans Affairs—announced May 22 on the VAs home page—that held the personal information of an estimated 26.5 million people is widely considered the nightmare scenario for those responsible for managing their companies IT security operations.

      “Nobody wants to be on the 6:00 news, and the reality is that we do lose equipment every year,” said Bill Jenkins, director of IT for Unicco, a provider of facility management services in Newton, Mass.

      To help protect the company if laptops go missing, Unicco has employed a multilayered defense approach that requires data encryption tools on every device and stresses education about improving users gear and information-handling habits.

      Experts agree that creating such a plan and employing multiple endpoint security tools is the best way to help prepare for eventual incidents.

      At Computer Sciences Corp., the issue of stolen or misplaced equipment is substantial because of the companys need to protect the interests of its high-profile customers and the logistics of managing its 79,000-strong employee work force.

      Michael Rider, chief information security officer for the El Segundo, Calif., company, said CSC is rapidly increasing its focus on protecting data stored on mobile devices. Beyond applying encryption applications to all laptops and other mobile devices, Rider said aggressive security policies are the most effective way to improve a companys standing.

      As part of that plan, companies should employ data forensics technology and other forms of investigation that will help them determine what information was stored on a particular device and whether the information has been compromised, he said.

      While its unlikely that a given laptop will be recovered, knowing what data may have been exposed on each specific machine before it goes missing will give companies a starting point for launching security efforts.

      Internally, CSC has created a security incident control center that serves as a clearinghouse for any IT mishaps.

      In maintaining a round-the-clock point of contact for workers when something goes wrong, the company can respond to incidents and mitigate risks much faster, Rider said.

      Another step to respond to stolen laptops is to organize a team of specialists who can help determine the seriousness of the event and what requirements companies may face to report incidents publicly.

      Executives at Pointsec Mobile Technologies, which markets endpoint device encryption applications, said enterprises must start with an internal policy that dictates how sensitive every piece of information is and how that specific data and the device it resides on must be protected.

      “A big part of this is making sure that the user base and the entire IT department know what they need to do to protect the information,” said Bob Egner, vice president of product management for the Lisle, Ill., company. “If you dont engage in this type of planning before you implement security technologies, you may find that your needs arent met by a lot of the products that are out there.”

      Pointsec recommends that its customers review all of the various device images they maintain and the configurations of every type of machine to determine what encryption tools fit each computer model best.

      Locking Down Your Laptop

      Some may seem obvious, but following these rules will keep your laptop and the data it carries out of other peoples hands.

      1. Use visual deterrents such as cable locks

      2. Avoid leaving unsecured laptops un-attended, even in the home or office

      3. Keep laptops inconspicuous by using simple carrying cases

      4. Use complex alphanumeric passwords and change them regularly

      5. Use anti-virus, encryption, anti-spyware and firewall software

      6. Back up valuable data on a scheduled basis

      7. Understand the dangers of pirated software and file sharing

      8. Stay informed of emerging theft schemes

      9. Use asset tracking and recovery software

      10. Employ advanced data protection tools

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×