Remote Laptop Security

Thursday, June 9, 2011


                                          Remote Laptop Security


 Laptop theft has become a serious issue for today’s individuals, businesses and corporations. Safeway Insurance estimates that in 2003 confidential information stored on 600,000 stolen laptops cost an estimated $5.4 billion. According to the FBI, 97% of stolen computers will not be recovered.
As cases of laptop theft become more and more frequent, security methods have been developed in order to protect data that is stored on these portable devices. Locks, cables and alarms are all used to deter thieves from taking physical property, but Remote Laptop Security (RLS) is designed to protect the information contained within. RLS is a security measure that allows a user to control files on a laptop even if it has been lost or stolen. When a laptop computer turns up missing, the data and information does not have to be sacrificed along with the machine itself.
Remote Laptop Security prevents access to all protected files on a lost or stolen laptop. The user in charge can choose which files he or she wants to safeguard using RLS software. Desired files are converted and encrypted in order to prevent all unwanted access. In the case of a loss or theft of a laptop, access to secured files on the stolen machine can be denied using any computer with an Internet connection.
With RLS software, users can be confident that sensitive data stays secure, even in the event of theft or loss of a computer.

                  WORKING OF RLS SOFTWARE

Remote Laptop Security (RLS) is designed to protect the information contained within. RLS is a security measure that allows a user to control files on a laptop even if it has been lost or stolen. When a laptop computer turns up missing, the data and information does not have to be sacrificed along with the machine itself.
Remote Laptop Security prevents access to all protected files on a lost or stolen laptop. The user in charge can choose which files he or she wants to safeguard using RLS software. Desired files are converted and encrypted in order to prevent all unwanted access. In the case of a loss or theft of a laptop, access to secured files on the stolen machine can be denied using any computer with an Internet connection.


 NEED FOR RLS.

• Safeway insurance estimates that in 2003 confidential     information stored in 60,000 stolen laptops cost an estimated     $5.4 billion.
• A laptop that belonged to an Ernst & young employee was stolen   from a vehicle. The computer contained personal information of   243000 hotels.com customers.
• Two federal trade commission laptops were stolen out of a locked    car when staff attorneys took them home to work on a lawsuit.    As a result names, addresses and social security numbers of 110    people were exposed to thieves.
• American international group, a major insurance company, became    responsible for private data of 970,000 potential customers   when their file server and several laptops were stolen from its   Midwest offices.
• A laptop containing debit card information and social   security  numbers of 65,000 persons was stolen from YMCA’S   seemingly safe  administrative offices.
•Highly sensitive documents related to Iraq war were stolen from a   lawyer’s laptop working for the US government.

• The duchess of York, a royal family were a victim of laptop    theft, lost their intimate family photos.


                       EARLY RLS TOOLS

• Laptop theft alarms.
• Laptop locks like Kensington locks.
• Visual deterrents such as stop security plates.
   Authorize access to important files by stored passwords

          MERITS

• Cheaper.
• Easy to handle.
• Portable
• Visual deterrents such as STOP security plates are impossible to    remove or destroy.
• Offers high security to the laptop, but not to the data.

          DEMERITS

• Alarms can be easily deactivated.
• Kensington locks can be easily unlocked or destroyed.
• Visual deterrents such as STOP security plates kill the resale     value of the laptop.
• Stored security passwords can be easily cracked and revealed.
• It offers no security to the data contained in the laptop.


LATEST RLS TOOLS

Remote laptop security software’s like:

Lanrev theft track.
Lojack for laptops.
Pc trak by gadget trak.
Mac trak by gadget trak.
Cyberangel security.

          MERITS

 Highly worth data is secure.
Computrace agent in the laptop is incredibly persistent and allows your laptops to maintain a connection wih the monitoring center even if the hard drive is completely reformatted or replaced.

    DEMERITS

Very expensive.
Offers no security for the laptop, security is only for the data.


1 comments:

  1. jithin said...:

    This is my seminar topic.......

Post a Comment

 
COMPUTER SOFTWARES AND MORE © 2011 |