Why Your Laptop Needs An “Instant Kill” Switch

/, Security, Technology/Why Your Laptop Needs An “Instant Kill” Switch

Why Your Laptop Needs An “Instant Kill” Switch

It’s lunch time and you stop by your favorite café to check e-mail and grab a bite to eat. You settle in at a table when your pickup number is called. Returning to your table, you find your laptop and appetite—has disappeared!

Okay, maybe you’re not foolish enough to leave your laptop unattended in a public place, but one of your employees might think it’s okay to leave a laptop or PDA in their car, a hotel room, or in their gym bag and end up exposing your company’s data and network to thieves.

If it hasn’t happened to you or someone you know, according to the FBI, it will. Sure you have a backup of the data, but now detailed information about you, your family, your business and your clients is in the hands of a criminal intent on stealing your money, identity or worse. There is a lot of software and hardware that protects your data from being stolen by online criminals, but how do you protect your data when someone steals your physical laptop or PDA?

Until now, your only recourse was to change the passwords to your network, financial websites, etc., watch your credit report and cross your fingers hoping for the best. But thanks to new security software, you can instantly erase all of the data on your laptop or PDA preventing thieves from accessing the data.

Here’s how it works: Special security software is installed on your laptop that checks for your “kill” command whenever it connects to the Internet. This happens even before Windows prompts for the user name and password. If it receives the “kill” message, the data on your computer is instantly destroyed. You may not get your laptop back, but you’ll prevent the thief from stealing the information it contains.

Over the years, we have had a few clients experience lost or stolen laptops and PDA’s. In some cases, there was real concern about the data that was on those systems.

We have been researching and evaluating the various technologies that are available to provide this level of protection and we’ve selected GadgetTrak ProActive Security as our recommended technology. GadgetTrak supports PC’s, Mac’s, Smart Phones, PDA’s, iPhones and USB devices like USB keys, iPods, Cameras and more.

If your PDA is stolen, you simply text a message to it that includes your password and the PDA is reset it to its blank factory default condition. What could be easier?

As with all theft and hacker deterrents, thieves can circumvent this software by downloading your data before connecting the device to the Internet. Surprisingly, the typical thief isn’t smart enough to know this. So, for absolute security, data encryption still remains the most reliable form of protection. Encrypted data is unreadable to thieves unless they have your encryption key. There are pros and cons to both approaches, but it’s important for you to have SOME protection. For help in determining the best solution for you and your business, give us a call @ 781-834-9208.

For additional information:
http://www.gadgettrak.com/

By |2009-02-02T17:56:41-05:00February 2nd, 2009|How To, Security, Technology|1 Comment

About the Author:

One Comment

  1. M@ February 3, 2009 at 9:57 am

    Interesting, I’ll have to check it out. The final paragraph is the most important… If you’re really concerned, you shouldn’t depend on a single method of security (esp one that can be defeated by simply not connecting to a network). You need to encrypt the data, or better yet, encrypt the entire disk. If you’re just a regular guy and need to protect your personal data, take a look at truecrypt.org. TrueCrypt open source, well tested and very effective at doing just data or full disk encryption at no cost to the user. I use it every single day. Hope that helps somebody!

Comments are closed.