* View status of security controls at a glance like anti-malware and encryption * Search and lock exposed devices before company data and personal information falls in the wrong hands Dynamically search for any device in your organization, monitor key security vitals and lock a device to render it completely inoperable, all through a few swipes on your phone. Notice in the map image earlier that the device is reporting in its location once/daily without any way for the thief to know that the software is installed (a critical element), and that if it is stolen, I can initiate the recovery process directly from the Web interface, including giving the Absolute team information so they can talk to the detective in charge of the case, since I’d need to file a report with the local police department as part of the process.The Absolute Control mobile app brings the power and flexibility of the Absolute platform to your smartphone. I’m running Absolute LoJack on my system and I’ve shared a few screen shots too. Both are now commonly used by thieves to pawn stolen goods and if a deal seems too good to be true - like a $900 laptop for $100 cash only - then it is, and it’s probably stolen. That’s worth a lot more than a computer.įinally, be leery of Craigslist and eBay. Records that have a street value of $75-$100 each. For example, Doug highlighted a situation where a dentist had his laptop stolen, gaining the thief access to almost 1000 patient records. Turns out that thieves are not only getting more and more tech savvy for circumventing passwords, encryption, access PINs, etc, but there’s so much information available online - just do a Google search for “bypass security password windows 7” or “jailbreak android phone” and you’ll see - that it’s foolish to rely solely on these security measures.ĭata turns out to be surprisingly valuable too. Where’s my MacBook Pro? Last known location is that black dot on “Lookout Road”.Īnd then there’s the data on the device, whether it’s a smartphone or computer. Knives, guns, or just a direct physical assault. It might be tempting to knock on the door of the place where you can tell that your laptop’s being used, but thieves are criminals and you really have no way of knowing what you’re about to step into. Which is why one of the things I hate to read are stories about how average citizens turn vigilante and take the law into their own hands. The Absolute LoJack investigation team were critical to the arrests and the leader of the gang was not only convicted of the theft but of two murders too. Yeah, that’s why I’m paranoid about those TSA security checkpoints and never have a nap while waiting for my flight to board.ĭoug’s team has tackled some big cases too, including one where an organized group of thieves stole almost 1000 computers from the Detroit Public School system. And there are way too many of those stolen too, and the most likely place for you to have your laptop stolen? The airport. Me? I’m all about computers and am far more worried about my laptop than my phone. Absolute LoJack also has a solution for smartphones, btw, if you’re worried about yours vanishing. That’s a huge increase, and part of the consequence is that your chance of having the police recover your device decreases as the number of crimes increases. In fact, they’ve even recovered stolen computers from places as far away as Afghanistan.Įven just sticking to smartphones, in 2012 there were 1.6 million smartphones reported stolen in the United States, and in 2013 that jumped up to 3.1 million. To learn more about the rather alarming world of computer and data theft, I jumped on a webinar with Doug Lubahn from the Absolute Investigations and Recovery Team.ĭoug worked with the Michigan State Police for almost 30 years before joining Absolute Software and he heads a group of 40 professional investigators who work globally. But what about data theft and what about recovery? Not to mention book manuscripts, confidential documents from clients, contracts, and so much more. Tax information, account passwords, financial data, and a vast array of personal information on family and friends. I constantly walk away from my laptop computer, and it’s a $2000 MacBook Pro, fully tricked out.īut even that price pales compared to the value of the data on the laptop. I’m as bad as the next person, or perhaps even worse.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |