Protecting Your Portable Devices and Information

Theft or loss of laptops, notebook computers, personal digital assistants, Blackberrys, and thumb drives, as well as the data on these devices, is a significant problem. There are many proactive steps that you can take to protect portable devices and the data on them, including: prevent the theft, use two-factor authentication, and encrypt your data. You can also take reactive steps after a theft or loss.

Before discussing these steps, there are two common-sense precautions that many people forget. First, keep your laptop in an inconspicuous container. Laptop cases with your company logo simply draw the attention of thieves. Second, do not leave your laptop unattended in plain view (for example, leaving it in your car where it can be seen). You should lock it in the trunk. To prevent theft of a portable device, you can use alarms. Laptop security systems operate by detecting motion, analyzing it to determine whether a threat exists, and implementing responses. They are battery-powered, they are independent of the computer operating system, and they operate whether the laptop is on or off. If a laptop armed with a security system is carried beyond a perimeter specified by the user, the alarm assumes the laptop is being stolen. It can then prevent access to the operating system, secure passwords and encryption keys, and sound an audible alarm. One company that provides laptop security systems is Caveo (

Two-factor authentication means that you must have two forms of identification to access your laptop or notebook. The first authentication factor uses a token or biometrics. The second factor is your personal password. A token generates a one-time password that you must enter within a specified time limit. This password typically consists of six digits, which appear on the token’s LCD screen. Companies offering tokens for two-factor authentication include Authenex (, Kensington (, and SecuriKey (

Fingerprints are the biometric used for two-factor authentication, by incorporating fingerprint
readers into the laptop itself. See IBM ( and Microsoft ( You can also use fingerprint authentication on your thumb drive with the SanDisk Cruzer (, the Lexar JumpDrive TouchGuard (, the Sony MicroVault (, and the Kanguru Bio Slider ( Data encryption provides additional protection by turning data into meaningless symbols, decipherable only by an authorized person.
Beachhead Solutions ( and Credant ( also provide applications that allow you to encrypt files and folders. Another step you can take to improve your security is to encrypt your entire hard drive, including your applications. See Pointsec (, Mobile Armor (, SafeBoot, the Kanguru Wizard (, and the PCKey (  If your laptop is lost or stolen, you can use laptop tracing tools or device reset/remote kill tools. For example, the XTool Computer Tracker (, PC PhoneHome (, and LaptopLocate ( provide transmitters that secretly send a signal to their respective company control centers via telephone or the Internet. This signal enables the company, with the help of the local authorities, Internet service providers, and telephone companies, to track your computer’s location.

You can also use device reset/remote kill tools to automatically eliminate specified data on a lost or stolen laptop to prevent it from being compromised or misused. The solution works even when other security software or encryption methods fail. Examples of companies providing these solutions are Trust Digital (, Intellisync (, and Beachhead Solutions (

{ 2 comments... read them below or add one }

Mike Perham said...

This is a great blog post. Thank you very much for the fantastic insight and we really appreciate the time you took to write this. Thanks again.
Celabright videos

Jerry Foreman said...

I high appreciate this post. It’s hard to find the good from the bad sometimes but I think you’ve nailed it! would you mind updating your blog with more information?
House Buyer San Antonio

Post a Comment