Thank you for sharing!

Your article was successfully shared with the contacts you provided.
BE ORIGINAL Most people are not very imaginative when it comes to log-ins; the two most common passwords are “password” and “secret.” Instead, use nonintuitive, letter-number combination passwords. Also, consider biometric devices, which may sound exotic but, in reality, are easy to find and relatively inexpensive. Targus Inc. makes a thumbpad for $120 that connects to a laptop’s USB port, and uses your fingerprint to authenticate your identity. CONTROL THE FLOW Thanks to the proliferation of Wi-Fi (wireless networking) access points and the use of wireless PC cards, a laptop may now be advertising its presence to would-be hackers. Use a software firewall, like Symantec Corporation’s or McAfee Security’s popular products; without it, hackers could gain access to your laptop or network. And when communicating with your office computer network, make sure the IT staff has set up a virtual private network, which will allow encrypted files to travel back and forth without being intercepted. ENCRYPT, ENCRYPT, ENCRYPT Encrypt sensitive files — it will deter all but the most sophisticated data thief. Windows PCs come with encryption tools preloaded; Apple PowerBooks allow users to encrypt files and directories. Consider partitioning your hard drive into two, installing high-grade encryption software to protect the sensitive portion, and using a smart card (which functions like an ATM card) to verify your identity for decryption. LOCK IT DOWN — LITERALLY Laptops, designed for portability, are also easy to steal. So lock yours down when you’re in a conference room or other public area. Use a cable lock, which attaches to a table top via a long steel wire. Also, consider a motion-sensing PC card, which will sound an annoying alarm if someone tries to move the machine. TRACE IT Several companies enable users to keep tabs on their laptops’ whereabouts with GPS — enabled (global positioning system) software or IP address (Internet protocol, a distinct number that every Internet-connected PC contains) tracing detectors. A few, like zTrace Technologies’s IP address tracing product, let users send messages to a thief and even disable the machine remotely.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Advance® Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]

Reprints & Licensing
Mentioned in a Law.com story?

License our industry-leading legal content to extend your thought leadership and build your brand.


ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2021 ALM Media Properties, LLC. All Rights Reserved.