![]() One very cool option that several of the vendors offer is the ability to remotely “kill” all the sensitive files on your stolen computer the first time that it connects to the Internet and some can even remotely “retrieve” those sensitive files as well. These systems are not perfect and how fast or effective local law enforcement will be with the information reported by the software varies widely. ![]() Once it gets a signal from your computer, which includes the IP address used to connect, they or you can report the information to law enforcement based on the location (an IP address along with a few other coordinates can be used to obtain a general local). ![]() The basic overview of how these services work is that you install a program that has what equates to a tracking beam in it that can be monitored and once you report your computer stolen, the tracking system starts “listening” for your computer to “phone home”. In order for these programs to work, the thief must a) Not wipe out or replace the computer’s hard drive and b) Connect to the Internet with your stolen unit. Since virtually every computer connects to the Internet these days, you can install special software on your computer that will allow you to determine where on the Internet it connects (via the IP address) should it ever be stolen. Your primary goal with these steps is to make it difficult to search through your computer files before they pawn it or reuse it for other purposes. Use encryption to scramble sensitive files, especially for business laptops Encryption is built into some operating systems (Windows XP Pro, Windows Vista Ultimate and MacOS X) or require a third party program such as TrueCrypt. Set a password on any documents or spreadsheets that may contain your personal information Minimize or remove any automatically saved usernames and passwords, especially for e-mail programs which are the gateways to taking over your online identity. Make sure you set a password in the computer’s operating system (Windows or MacOS) Laptop users may want to consider adding an additional password that is set at the hardware level in the “BIOS” of the computer as well. Since we know that the potential for identity theft from a stolen computer is high, taking steps to protect yourself in the event of a theft before it happens is extremely wise.īefore I get into the tracking options, here are a few basic steps everyone should consider (especially if you own a laptop): When a computer is stolen, there are two primary concerns the obvious loss of property and the not so obvious loss of proprietary information How many of us really know exactly how much personal information is stored in all the nooks and crannies of our computers? What was once an easy item for thieves to sell for quick cash at a pawn shop is now also the target of sophisticated identity thieves, so the likelihood that you will have a computer stolen in your lifetime is getting pretty good. The fact that virtually every computer contains sensitive personal or business information has added to the computer theft problem for everyone. ![]() Much of the information contained herein may have changed since posting. This question was answered on October 17, 2008. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |