- Inc. Technology - http://technology.inc.com -
Posted By Anne Stuart On March 1, 2001 @ 12:00 am In Computer Security | No Comments
Business travelers aren’t the only ones enamored of their ever smaller, ever lighter laptop computers. Thieves love them, too. Nearly 320,000 laptops were stolen in the United States in 1999, up from 208,000 in 1995, according to Safeware, an Ohio-based insurance company that specializes in computer coverage. In 1999 alone, Safeware says, losses exceeded $800 million. And that was just for the equipment itself, not for data that might have been worth far more.
When it comes to preventing theft, nothing beats awareness. Treat your machine as if it were your wallet. Don’t flash it around. Carry it yourself. Never leave it unattended in public. Other options for protecting portables include:
Cable locks. One end wraps around a post or a piece of furniture and the other fits into the notebook’s built-in security slot (standard on most models). Computer Security Products Inc., among others, makes generic locks for many computers.
Alarms. Motion-detectors like Port .com’s DEFCON alarm snap onto computers and shriek if the device is touched or moved. Port.com also makes cases with built-in alarms. A road-warrior variation: TrackIT’s two-piece system includes a key-chain remote for the owner and an alarm for the computer. If a thief swipes the ma- chine, its alarm wails within seconds.
Built-in security. Some new laptops come with smart cards that lock computers or disk drives when they’re not in use. Acer’s latest TravelMate model replaces passwords with fingerprint recognition; if a would-be user’s prints don’t match those in the TravelMate’s memory, the computer won’t boot.
Tracking devices. Using methods similar to those of the LoJack vehicle- retrieval system, several services now help authorities recover stolen computers (including CyberAngel, Computrace, and zTrace). Users install “stealth software” on their hard drives. If somebody steals the machine and goes online with it, the software automatically signals the tracking service, which can pinpoint the user’s location by telephone number or address. Local police handle the rest.
Meetings within Meetings 
Do-It-Yourself Networking 
Things We Love: A Nightlight for Laptops 
Meet the New Boss 
Copying Web Design: How Much Is Too Much? 
Hostage Situation 
Please e-mail your comments to email@example.com .
Article printed from Inc. Technology: http://technology.inc.com
URL to article: http://technology.inc.com/2001/03/01/laptop-insecurity/
URLs in this post:
 Meetings within Meetings: http://www.inc.com/magazine/20010315/22242.html
 Do-It-Yourself Networking: http://www.inc.com/magazine/20010315/22278.html
 Things We Love: A Nightlight for Laptops: http://www.inc.com/magazine/20010315/22245.html
 Meet the New Boss: http://www.inc.com/magazine/20010315/22246.html
 Copying Web Design: How Much Is Too Much?: http://www.inc.com/magazine/20010315/22247.html
 Hostage Situation: http://www.inc.com/magazine/20010315/22248.html
 firstname.lastname@example.org: mailto:email@example.com
Copyright © 2011 Inc Technology. All rights reserved.