Evidence Solutions, Inc., (ESI) is a premier forensics company founded in 1982.

ESI Provides Elite experts in:

Digital and Electronic Evidence, Computer Forensics, Cell Phone Forensics
Trucking, Truck Accident Investigation and Trucking Regulations, Truck Safety Consulting, Heavy Vehicles & Hazardous Materials
Sports and Fitness, Fitness Facility Standard of Care
Real Estate & Land, Real Estate Syndication
Bankruptcy and Corporate Governance
Accident Reconstruction

Call for a free consultation: 866-795-7166

 

 

Computer System Security Expert:
10 Steps to a More Secure Laptop ( 6 – 10 )!

Is Your Laptop Secure?

E-Discovery Expert / Computer Forensics Articles

By Scott Greene

Our digital security experts at Evidence Solutions have written about laptop security several times. In our last article we covered items 1 through 5. That may be found here:

Cyber Security Expert: 10 Steps to a More Secure Laptop 1–5 

Cyber Security Expert: Treat Your Laptop Like Cash

Computer Breach Expert: Keep Your Laptop Safe!

Mobile technology, especially laptops, push along productivity. Whether you’re in the office, at home, in school, in a hotel or at coffee shop, laptops are everywhere. The mobile computer allows you to stay in touch and do productive work regardless of where you are in the world.

However, along with portable productivity comes vulnerabilities. Laptops get lost or stolen frequently. Gartner, Inc., a technology research firm based in Stamford Connecticut, recently said an estimated 68 laptops go missing every hour, one every 53 seconds.

Evidence Solutions, Inc. has seen firsthand, through our clients, the time, pain and security breaches accompanied with loss of a laptop. We have compiled a list of 10 steps to help reduce the pain of the lost or stolen laptop. Below are steps 6 through 10.

6.  Make a note of registration codes for hard-to-find software.

Software registration codes, especially for older software, are difficult and sometimes impossible to replace. Most newer software programs are activated over the Internet. Keep track of your installation and activation codes where you are able to retrieve a copy. A simple way to keep this information is in a document which synchronizes to the cloud and also gets backed-up to a local backup device.

A copy of the installation software is also important. Save a copy somewhere safe so you can reinstall the software should the need arise.

7. Encrypt portable devices.

Encrypting your laptop's hard disk drive is key. However, remember to encrypt all portable devices as well. These include such things as an USB hard disk drives and thumb drives. Devices get lost and devices are stolen from offices and hotel rooms more often that most people think. Encrypting all of your portable storage devices will keep the electronically stored information ( ESI ) safe. It may also prevent competitors and hackers from obtaining the information that has been backed up or stored on these portable devices.

Most of the external device manufacturers are bundling encryption software and backup software with their products. In addition, you can use the operating system’s encryption options to encrypt these portable devices as well.

8. Treat your laptop like cash!

Keep your laptop physically secure. Act like it is a pile of $100 bills. You wouldn't just leave several thousand dollars in cash laying around. Why would you leave a laptop out in the open unattended?

Laptop physical security includes keeping your laptop in sight. When you can't keep it in site, keep it locked down.

We know people who have had their laptops disappear at TSA check points. A place where one would think laptops would be relatively safe. Our traveling consultants watch their brief cases go into the xray machine and then get to the other side as quickly as possible to watch it emerge from the xray machine. We don’t let the TSA inspectors or fellow airline passengers distract us from watching our valuables.

Locking your laptop down is not a difficult, nor is it expensive. Locking cables for laptops range from $5 to $100 or more. Most of our consultants have two. The first is permanently kept in their car’s trunk to lock down the laptop when it is in their vehicle. The second is carried around in their brief case and used to secure their machine everywhere else. This includes hotel rooms, class rooms, meeting facilities and offices we may be visiting.

Even though cable locks can be defeated with the right tools, it slows down the perpetrator. Cables are a great deterrent. A perpetrator who is attempting to make off with a laptop is certainly going to make some noise or cause some commotion. Either of these will bring attention to the perpetrator.

Though all locks can eventually be defeated, even a simple physical lock can go a long way towards making you a less-appealing target – and possibly sending the bad guys elsewhere instead. Alternatively, an alarm system such as the Proximo is a physical fob system which helps you find your items – and which can be configured to sound an alarm when tracked items go out of range.

9. Remember to include a ‘please return’ note.

After taking all of the precautions listed above, remember to make it easy for your laptop to be returned home should it be found. Include a simple note with information of how to return your laptop. This could include an address, a contact number, an email address. Perhaps printed on a sticker or business card attached to the bottom of your device. This information, ideally, will be in the computer electronically as well. Perhaps as part of the screen saver.

Obviously this won’t work if your laptop is stolen. However if it is simply misplaced and found by a Good Samaritan, it makes reuniting the machine with its owner easy.

10. Set it up laptop for remote tracking and/or wiping.

There are several services which you can pay to locate your stolen laptop. These services will locate the device and work to re-unite you with the device. Software such as Prey or LoJack are installed before you lose your device. These services allow you to track the location of the device either by GPS, if that is built in, or by IP address. In addition, these products allow you to send an alarm or message to the device. In the worst case scenario you can wipe the device leaving nothing behind and giving you the peace of mind the data on the machine didn't fall into the wrong hands.

Note: You should never attempt to recover a stolen laptop by yourself. Even if the device is nearby. Contact law enforcement and have them help you recover the laptop.

 

Contact us!

We are experts in Computer Security and Digital Forensics. Call us today for a FREE consultation: 866-795-7166

By Scott Greene

Evidence Solutions, Inc.

Complex Electronic Evidence in PLAIN English.

Call us today with your Car Evidence Questions: 866-795-7166 or This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Related Forensics Expert Articles and Pages.

Cyber Security Expert: 10 Steps to a More Secure Laptop 1–5

Computer Forensics

Data Breach Expert: Visual Hacking a Threat Most Miss

Cell Phone Security Expert: Children Smart Phone Safety!

 

An Article from our Trucking Experts:

Truck Crash Expert: FMCSA Admits CSA Accident Scoring Issue
 

Complex Electronic Evidence in PLAIN English.

Like Evidence Solutions - Computer Data Breach Forensics Experts on Facebook

Follow Evidence Solutions - Digital Evidence Experts Division on LinkedIn

Circle Evidence Solutions - Electronic Forensic Evidence Investigation Experts on Google+

Google+ Author

Google+ Publisher