No Witnesses, No Evidence

No problem for software program designed to track laptops

When a laptop computer disappeared recently from the offices of MDx Medical Management Inc. in White Plains, N.Y., the company's president, Thomas Schuetz, turned to Absolute Software to get the laptop back.

The theft occurred when the company was relocating offices and numerous people were coming and going. There was no evidence as to who committed the crime and no witnesses to the theft.

undefinedThe key for any business is to implement a layered approach to laptop security from visual deterrents, such as cable locks, to tracking and recovery software, to remote data deletion when data security is of paramount concern.

"Fortunately, we had installed ComputraceComplete on all our corporate computers, so after we notified the police, we contacted Absolute Software," Schuetz said.

An initial investigation by the police yielded nothing. Inevitably, the laptop silently contacted the Absolute Recovery Center, supplying critical location information. When a computer protected by ComputraceComplete is reported lost or stolen by its owner, the Absolute recovery team flags the computer as missing, then waits for the laptop to discreetly contact the company's monitoring center via its Internet connection every 15 minutes.

Absolute's theft recovery team tracked the laptop as it logged onto the Internet in Florida, then a few days later in Manhattan. An Absolute recovery officer then provided the Manhattan precinct with a name, phone number and address, indicating precisely where the laptop was located. Manhattan detectives then contacted the computer user, resulting in the laptop being immediately returned to the police. The investigation continues into how this person came to be in possession of MDx's laptop.

"I am extremely impressed with ComputraceComplete. The Absolute Recovery Team was able to track and recover a critical piece of hardware for MDx Medical, proving its worth many times over," Schuetz said. "I am a happy Absolute Software customer. In fact, I have already recommended ComputraceComplete to two other companies we do business with."

<

Tip for Preventing Thefts

With the help of the following best practices and helpful tips -- from common sense to high-tech solutions -- your small business need not be counted among the ranks of those companies ill-prepared for laptop theft.

Use cable locks as visual deterrents. Truth be told, most cable locks can be ripped off the plastic exterior of a laptop with a strong tug. Cable locks are therefore akin to ink-filled garment security tags in clothing stores -- they leave a mark when removed by force, but are ineffective at preventing many thefts.

Avoid leaving unsecured laptops unattended. Lock them in cupboards, laptop carts or other secure facilities when not in use. If they must be left in a vehicle, they should be covered up or locked in the trunk.

Keep laptops inconspicuous. Laptops should always be carried in inconspicuous carrying cases, such as a backpacks or tote bags, instead of tell-tale laptop bags.

Change passwords regularly. Never leave your password in obvious places such as a sticky note under your keyboard or on your desk.

Keep anti-virus software and firewalls installed and up-to-date. Prevent unauthorized access and protect valuable information with data encryption software.

Back-up valuable data on a scheduled basis. Data back-up needs to happen as frequently as required to minimize the risk to the organization in the event of loss.

Understand the dangers of pirated software and file sharing. Both piracy and over-deployment of purchased licenses can lead to significant lawsuits or other financial penalties. And not only is it illegal, pirated software can increase susceptibility to viruses, Trojans and other attacks.

Stay informed. Continue to educate yourself on the tools and techniques used today by cyber criminals, as well as other security risks to company data.

Use asset tracking and recovery software. Laptop recovery tools are highly effective because thieves know that hardware is more valuable if they can prove it works. To do so, they inevitably turn the hardware on and connect to the Internet, at which point the software agent -- unbeknownst to the thief -- reports its location information, helping police recover the device.

Invest in advanced data protection. Industry-leading data protection software allows customers to track fixed, remote and mobile computer assets, and remotely wipe sensitive information in the event that a computer is lost, stolen or nearing the end of its lifecycle.

Laptop Theft Statistics
While MDx Management adequately protected itself against laptop theft, countless organizations cannot say the same. Insurance agency, Safeware, claims that more than 600,000 laptops were stolen in 2004, resulting in an estimated $5.4 billion in loss of proprietary information. According to the FBI, 97 percent of stolen computers are never recovered. Gartner Group estimates that 73 percent of companies do not have specific security policies in place to protect their laptop computers.

Laptops are easy targets because they are designed to be portable. Yet, organizations risk litigation, lost business and public relations nightmares when a laptop goes missing. Veterans Affairs, Ernst & Young and Fidelity Investments have all recently faced intense media scrutiny after employee laptops disappeared.

Laptop theft may be impossible to fully prevent, but there are numerous tactics and technologies an organization can employ to help protect their mobile assets around the clock, in the office or on the road. In fact, Absolute Software has found that while the average corporate laptop theft rate is between 3.5 percent and 5 percent, organizations using laptop theft recovery software have a theft rate lower than 0.5 percent.

As current laws mandate public disclosure of data breaches, organizations are clamoring for strategies to both prevent laptop thefts and comply with privacy regulations when the unthinkable occurs.

The key for any business, large or small, is to implement a layered approach to laptop security from visual deterrents, such as cable locks, to tracking and recovery software to remote data deletion when data security is of paramount importance.

Regulations and Compliance
In response to the ever-increasing volume of sensitive and confidential information stored electronically on remote and mobile computers, and the potential and actual breaches of privacy that have occurred, governments have dramatically increased regulatory legislation designed to protect personal information.

California S.B. 1386 requires all organizations in the state of California that own or license computerized data containing personal information to disclose to residents any breach of security if unencrypted personal information is reasonably thought to have been compromised by an unauthorized person. Furthermore, the bill extends beyond California's borders because it also applies to any business that holds data on a California resident. Most states have adopted legislation similar in scope to Senate Bill 1386.

HIPAA establishes rules for handling and securing medical records to ensure the privacy and security of patient information. The act pertains to organizations that process, transmit or store protected health information. Noncompliance carries significant civil and criminal penalties.

Sarbanes-Oxley Act requires accurate reporting of all assets, including computer assets. Non-compliance carries severe penalties (fines of up to $5 million and imprisonment for up to 20 years) for senior management.

Gramm-Leach-Bliley is a law that mandates that all companies protect the security and confidentiality of their customers' private information. To comply, organizations storing personal customer information must identify and safeguard against the loss of any personal information.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3