Skip to main content

Laptop Theft Tips on how to avoid or mitigate it

You may be travelling for company or personal work and you may taking your laptop along with you. Your laptop may contain sensitive information about your work or personal information like backup of your Palm handheld. Unsecured information on your laptop makes your data vulnerable for theft both business and identity theft.

Big savings on top brand laptops at Misco

Simple tips to protect your laptop:
  1. Protect your laptop with a strong password: If you travel with your laptop frequently, you should secure it with a strong password. A good password would be combination of alpha numeric and special characters. E.g. c00lWelc0me! ... using zero instead of 'o'
  2. Back up before you go: Always back up your information before you take your laptop on a trip. You can't always avoid the financial loss of your equipment, but you can avoid losing all your information in the process.
  3. Be careful what you store on your thumb drives: With the growing popularity and increasing memory capabilities of small flash drives (known as "thumb drives") comes a greater risk of information theft. If you travel with a thumb drive, try not to store sensitive information on it. If you lose the drive or if the drive is stolen it's easy for anyone to access that information.
  4. Don't leave your laptop or its carrying case in plain view in the car; lock it up in the trunk. If they can't see it they can't steal it.
  5. When staying in a hotel, the best practice is to take it with you or to lock it up in an in room safe. If a safe is not available then use a physical cable lock. You may also want to hang up a do not disturb sign on your door.
  6. NEVER leave your laptop for even a second especially in busy airports. It just takes a minute to be distracted, which is enough in most cases for someone to walk away with your laptop.


PCWB Storage

Some sophisticated techniques:
  • Data Encryption: Full disk encryption (FDE) can be taken on from a software-based approach, a hardware-based approach, or both - end-based approach. FDE can especially be effective against cold boot attacks and provides protection before the operating system starts up with pre-boot authentication. List of products. Encrypt your data with Windows XP Professional.
  • Remote Laptop Security (RLS) is available to confidently secure data even when the laptop is not in the owner's possession. With Remote Laptop Security, the owner of a laptop can deny access rights to the stolen laptop from any computer with Internet access.
Recommended reading and sources
  1. Laptop Security Tips
  2. Laptop Protection - tips from Microsoft
  3. CNET tips
  4. Mobile Computing
  5. Best Data Encryption options
Regards,

Santosh Puthran

Sign Up and Make money displaying Oxado contextual ads!


Book a room at the Radisson Edwardian Heathrow Hotel.

Do you like to be updated in Accountancy ?

Subscribe to Management Accountant by Email

Or

Subscribe in a reader


SAP Store, UK

If you liked this article, please visit one of the links below. I would appreciate it


Management Accountant Store, US - Powered by Amazon
Management Accountant Store, UK Stores - Powered by Amazon, UK
Digital Store, US


You may also like to read

  1. What is Phising ?
  2. Identity Theft
  3. Resistance to Change 26-Apr-08
  4. Strategy Development 05-Apr-08
  5. Strategic Drift 12-Apr-08
  6. How to Share Blog posts with friends 25-May-08
  7. Management Accountant Blog Home



Post a Comment

Popular posts from this blog

Throughput Accounting

Throughput accounting (TA) is an alternative to cost accounting proposed by Eliyahu M. Goldratt. It is not based on Standard Costing or Activity Based Costing (ABC). Throughput Accounting is not costing and it does not allocate costs to products and services. It can be viewed as business intelligence for profit maximization. Conceptually throughput accounting seeks to increase the velocity at which products move through an organization by eliminiating bottlenecks within the organization.


Cost (or Management) accounting is an organization's internal method used to measure efficiency. Since no one outside the organization uses such internal accounts for investment or other decisions, any methods that an organization finds helpful can be used.


Throughput accounting improves profit performance with better management decisions by using measurements that more closely reflect the effect of decisions on three critical monetary variables (throughput, inventory, and operating expense — defin…

Learning Curve Theory

Learning Curve Theory is concerned with the idea that when a new job, process or activity commences for the first time it is likely that the workforce involved will not achieve maximum efficiency immediately. Repetition of the task is likely to make the people more confident and knowledgeable and will eventually result in a more efficient and rapid operation. Eventually the learning process will stop after continually repeating the job. As a consequence the time to complete a task will initially decline and then stabilise once efficient working is achieved. The cumulative average time per unit is assumed to decrease by a constant percentage every time that output doubles. Cumulative average time refers to the average time per unit for all units produced so far, from and including the first one made.

Major areas within management accounting where learning curve theory is likely to have consequences and suggest potential limitations of this theory.


Areas of consequence:
A Standard Costing

Resistence to Change - Approaches of Kotter and Schlesinger

The Six (6) Change Approaches of Kotter and Schlesinger is a model to prevent, decrease or minimize resistance to change in organizations.
According to Kotter and Schlesinger (1979), there are four reasons that certain people are resisting change: Parochial self-interest (some people are concerned with the implication of the change for themselves ad how it may effect their own interests, rather than considering the effects for the success of the business)Misunderstanding(communication problems; inadequate information)Low tolerance to change (certain people are very keen on security and stability in their work)Different assessments of the situation (some employees may disagree on the reasons for the change and on the advantages and disadvantages of the change process) Kotter and Schlesinger set out the following six (6) change approaches to deal with this resistance to change: Education and Communication - Where there is a lack…