Laptop Security

500 views
444 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
500
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Laptop Security

  1. 1.
  2. 2. Laptop Security<br />CompuTRACKS<br />
  3. 3. How Bad Is It?<br />100 Laptopslosteachday in the U.S <br />16,000 losteachweek in U.S., Europe & U.A.E.<br />1 in 10 Laptops<br />33% recovered<br />Ponemon Institute 2009<br />
  4. 4. How Bad Is It?<br />½ Business Travelers Report their Laptop has Sensitive Data<br />73% of Corporations had a Data Breach Over a 2 yearPeriod<br />Ponemon Institute 2009<br />
  5. 5. -> Facts<br />Organizations’ main reason for not issuing laptop lock — perceived lack of need. <br /> <br />Employees main reason for not using a laptop lock — forgetfulness <br />Less than half of laptop locks are used correctly <br />
  6. 6. Cost of a Data Breach<br />$202 per data record breached<br />285 million records breached in 2009<br />(Verizon Business Report)<br />Calculatoranyone?<br />$57,570,000,000,000<br />Or $365,000 per incident for eachcompany<br />(Axcess Report)<br />Onlyreportedbreaches<br />43% whoexperienced a lossdon’t report them<br />
  7. 7. -> Fact<br />10.5% of theft is suspected to originate from within the workplace <br /> <br /> <br />
  8. 8. Data Costs<br />Averagecost of a lostlaptopis $49,246<br />(Ponemon Institute, 2009) <br />80% of the costis in the data<br />If the data is of high value the costmay more than double up to $250,000.<br />ReactiveCosts<br />Security Costs<br />
  9. 9. -> Facts<br />On average it takes more than 9 days to replace a laptop<br /> <br />Organizations underestimate the cost of downtime by 31% <br />
  10. 10. Information Security Levés<br />
  11. 11. -> Facts<br />Well implemented security policies reduce laptop theft by 43% <br /> <br /> <br />58% of laptops are stolen from the office and 85% of IT managers suspect internal theft <br />
  12. 12. Security levels by Information<br />
  13. 13. What Can Be Done<br />Don’t Be Stupid!<br />StrongPasswords<br />BIOS<br />Basic input/<br />Output system<br />
  14. 14. What Can Be Done? <br />Strong Windows Password<br />May be the same as the BIOS password<br />Virus & Malware Protection<br />Cloud Data Storage & Backup solutions<br />Internet<br />Stay Away<br />Questionable sites<br />Game Sites<br />
  15. 15. What Can Be Done?<br />Backup Your Data!!!!!!!<br />Routine<br />At Least Weekly<br />Locally to USB External Device (or 2)<br />Carbonite - $55.00 per year<br />Search PC Mag.com for best backup<br />Lojack, GPS Navigator<br />Remote Self-Destruct<br />
  16. 16. WishingisTooLate<br />

×