Remote Laptop Security
Laptop theft has become a serious issue for today’s individuals, businesses and corporations. Safeway Insurance estimates that in 2003 confidential information stored on 600,000 stolen laptops cost an estimated $5.4 billion. According to the FBI, 97% of stolen computers will not be recovered.
As cases of laptop theft become more and more frequent, security methods have been developed in order to protect data that is stored on these portable devices. Locks, cables and alarms are all used to deter thieves from taking physical property, but Remote Laptop Security (RLS) is designed to protect the information contained within. RLS is a security measure that allows a user to control files on a laptop even if it has been lost or stolen. When a laptop computer turns up missing, the data and information does not have to be sacrificed along with the machine itself.
Remote Laptop Security prevents access to all protected files on a lost or stolen laptop. The user in charge can choose which files he or she wants to safeguard using RLS software. Desired files are converted and encrypted in order to prevent all unwanted access. In the case of a loss or theft of a laptop, access to secured files on the stolen machine can be denied using any computer with an Internet connection.
With RLS software, users can be confident that sensitive data stays secure, even in the event of theft or loss of a computer.
WORKING OF RLS SOFTWARE
Remote Laptop Security (RLS) is designed to protect the information contained within. RLS is a security measure that allows a user to control files on a laptop even if it has been lost or stolen. When a laptop computer turns up missing, the data and information does not have to be sacrificed along with the machine itself.
Remote Laptop Security prevents access to all protected files on a lost or stolen laptop. The user in charge can choose which files he or she wants to safeguard using RLS software. Desired files are converted and encrypted in order to prevent all unwanted access. In the case of a loss or theft of a laptop, access to secured files on the stolen machine can be denied using any computer with an Internet connection.
NEED FOR RLS.
• Safeway insurance estimates that in 2003 confidential information stored in 60,000 stolen laptops cost an estimated $5.4 billion.
• A laptop that belonged to an Ernst & young employee was stolen from a vehicle. The computer contained personal information of 243000 hotels.com customers.
• Two federal trade commission laptops were stolen out of a locked car when staff attorneys took them home to work on a lawsuit. As a result names, addresses and social security numbers of 110 people were exposed to thieves.
• American international group, a major insurance company, became responsible for private data of 970,000 potential customers when their file server and several laptops were stolen from its Midwest offices.
• A laptop containing debit card information and social security numbers of 65,000 persons was stolen from YMCA’S seemingly safe administrative offices.
•Highly sensitive documents related to Iraq war were stolen from a lawyer’s laptop working for the US government.
• The duchess of York, a royal family were a victim of laptop theft, lost their intimate family photos.
EARLY RLS TOOLS
• Laptop theft alarms.
• Laptop locks like Kensington locks.
• Visual deterrents such as stop security plates.
Authorize access to important files by stored passwords
MERITS
• Cheaper.
• Easy to handle.
• Portable
• Visual deterrents such as STOP security plates are impossible to remove or destroy.
• Offers high security to the laptop, but not to the data.
DEMERITS
• Alarms can be easily deactivated.
• Kensington locks can be easily unlocked or destroyed.
• Visual deterrents such as STOP security plates kill the resale value of the laptop.
• Stored security passwords can be easily cracked and revealed.
• It offers no security to the data contained in the laptop.
LATEST RLS TOOLS
Remote laptop security software’s like:
Lanrev theft track.
Lojack for laptops.
Pc trak by gadget trak.
Mac trak by gadget trak.
Cyberangel security.
MERITS
Highly worth data is secure.
Computrace agent in the laptop is incredibly persistent and allows your laptops to maintain a connection wih the monitoring center even if the hard drive is completely reformatted or replaced.
DEMERITS
Very expensive.
Offers no security for the laptop, security is only for the data.
This is my seminar topic.......