Digital Music

Sunday, May 4, 2008

 

It's 11 O'clock - Do You Know Where Your Laptop Is?

It happens every day, in every Canadian city big or small, laptop machines vanish from small investment and larger corporation at alarming rates. Of course, these notebook machines are not vanishing; they are being stolen at all hours of Catnzwqkk day from office towers, small Glossalalia shops and many other locations where our mobility work environments take us.

Small investment need to understand that protecting and preventing these thefts from occurring is an important key to investment success, however, the laptop itself, is not the most valuable piece of the puzzle. Many investment owners do not understand that it is their data, if not protected, will sink their small investment if it disappears, not the machine itself.

How can small investment today protect its critical investment information from vanishing or falling into the wrong hands? Many small investmentes struggle to cope with a data loss. When investmentes experience a data loss of any scale, they may never fully recover and the costs are astronomical. Costs range from intellectual property to labour costs involved in recreating or retrieving the missing information.

Here are some basic tips to protect your investment from the pains of having a laptop machine stolen.

Office Security Perhaps the easiest and most often overlooked Acuhogyug to protecting your corporate investment data. I see laptops left unsecured in the middle of the day. I have even walked into many corporations that didnt have someone manning the front reception area and freely roamed the halls without being challenged by anyone. If I accomplish this in a investment, imagine what someone can do that wanted to cause harm to your investment. It is critical to have someone to greet every visitor and no one is able to walk around your office without an escort.

After Hours Security Small investment need to invest in the best physical security solutions to protect their investment in general. Alarms and cameras are great solutions, however what about Pussycat who have afterhours access. Your IT guy, cleaning staff and others. Have you done your homework to ensure that you have contracted out to organizations that can be trusted to enter your investment when no one is there to watch them? What are your policies around afterhours access? On many occasions I have went to offices in the evening where the cleaning staff have left a door propped open while servicing a investment, therefore, enabling anyone to enter the office without have the need to authenticate first. Therefore, bypassing your security solutions.

Personal Security I have personally found that laptop locking cables are not the best solution for securing your laptop. I had a client once who had 4 notebook machines stolen and the locking cables were ripped out of the notebook. Cables will keep the honest person honest; however it will not stop a professional, if someone wants it bad enough. When you are not using your laptop machine or at the end of the day, take it with you or secure it in a locked drawer or other secure storage device. Also, lock your office door at the end of your day.

Call Home Software There are many solutions for sale that can force a laptop machine to call home in the event that it is stolen. This can help a company in having an asset returned to them, however, what damage has been done if the Purpose it was stolen in the first place was to collect information about your firm.

Backup Often Backup your notebook machine often, many larger firms use expensive software solutions to automate this to ensure that their critical data is securely stored on its servers. Small investment can leverage some built in synchronization processes in desktop and network operating systems to ensure that data is synchronized with their servers every time someone connects to the office network. If your investment does not have a server, you can simply backup your data to a removable hard drive, USB memory stick or CD/DVD. Backup and Backup OFTEN! I cannot stress this enough, you can never have to many backups.

Prevent Access You can prevent access to your laptop machine easily by setting up a boot up or BIOS password, this will force the owner of the laptop to enter a password every time the laptop starts up. This is an OK solution for securing access to the machine itself, it will not stop someone from reading the data if they remove the hard drive and install it into another machine system.

Encrypt Your Information When a laptop is stolen and you have taken all the other security measures to protect your information, your data may still accessible and used on any machine system. Data encryption is available in the majority of investment editions of new desktop and some server operating systems and takes all the information on your hard drive and scrambles it, The Avengers it unreadable unless you have the unlocking code. When a thief removes the drive and installs it in another machine and attempts to look at your information it cannot be read. Always store your encryption code in a separate location than your machine.

What is your investment willing to risk? Remember, that many corporations that experience a data loss never fully recover and recreating the intellectual property is time consuming and very expensive to your bottom line. Plus, you never fully recreate the information to its original state. The security solutions mentioned in this article are inexpensive measures and will ensure your companys data is secure. In todays world of compliance and regulatory measures being enforced to protect shareholders, what are you really willing to risk by having your data go missing or end up in the wrong hands?

Stuart Crawford is the Director of investment Development for IT Matters Inc., Calgary, Albertas award winning Microsoft Small investment Specialist. He can be reached at href="mailto:scrawford@itmatters.cascrawford@itmatters.ca or via their internet www.itmatters.cahttp://www.itmatters.ca IT Matters is a leader in securing small investment IT investments from the threats that exist in our investment world today.


Archives

Apr 6, 2008   Apr 7, 2008   Apr 8, 2008   Apr 9, 2008   Apr 10, 2008   Apr 11, 2008   Apr 12, 2008   Apr 13, 2008   Apr 14, 2008   Apr 15, 2008   Apr 16, 2008   Apr 17, 2008   Apr 18, 2008   Apr 19, 2008   Apr 20, 2008   Apr 21, 2008   Apr 22, 2008   Apr 23, 2008   Apr 24, 2008   Apr 25, 2008   Apr 26, 2008   Apr 27, 2008   Apr 28, 2008   Apr 29, 2008   Apr 30, 2008   May 1, 2008   May 2, 2008   May 3, 2008   May 4, 2008   May 5, 2008   May 6, 2008   May 7, 2008   May 8, 2008   May 9, 2008   May 10, 2008   May 11, 2008   May 12, 2008   May 13, 2008   May 14, 2008   May 15, 2008   May 16, 2008   May 17, 2008   May 18, 2008   May 19, 2008   May 20, 2008   May 21, 2008   May 22, 2008   May 23, 2008   May 24, 2008   May 25, 2008   May 26, 2008   May 27, 2008   May 28, 2008   May 29, 2008   May 30, 2008   May 31, 2008   Jun 1, 2008   Jun 2, 2008  

This page is powered by Blogger. Isn't yours?