Six Best Practices for Complete Laptop Protection

430 views

Published on

A presentation I delivered for eFolder on 28th May, 2013 discussing "Six Best Practices for Complete Laptop Protection".

This presentation will be of interest to IT Professionals who wish to secure their own devices, and to IT Solution Providers and Managed Service Providers (MSP's) who wish to create a revenue stream out of device protection for their SMB clients.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
430
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Six Best Practices for Complete Laptop Protection

  1. 1. Six BestPractices forComplete LaptopProtectionRichard TubbProviding Expert Advice to Help ITCompanies Growwww.tubblog.co.uk
  2. 2. Agenda● My story - why I became interested in deviceprotection● The six lessons for device security● The best free software to help you recoverlost or stolen devices● Why your clients are probably unpreparedfor endpoint losses● How to make endpoint protection a businessopportunityFeel free to ask questions in the WebChat, or by Twitter @tubblog
  3. 3. Why I became interested in deviceprotection● December 2011● Presenting at Autotask UserGroup in UK to 100+ people● As Im due to go on stage Irealised my laptop had beentaken● And yes, the presentationwas on the laptop...
  4. 4. Lesson Number 1 - Keep your databacked up
  5. 5. Lesson Number 2 - Know how toquickly access your backups
  6. 6. Lesson Number 3 - Maintain anaccurate record of your assets
  7. 7. Lesson Number 4 - Your Data ismore valuable than your Hardware!
  8. 8. Lesson Number 5 - Install TrackingSoftware on your mobile devices
  9. 9. Lesson No 6 - Make sure yourinsurance schedule is current
  10. 10. In Summary● Keep your Data Backed Up - DropBox, Live Mesh● Know how to quickly access your backups - KeePass,LastPass● Maintain accurate asset register - Make/Model, SerialNo● Register your items with Immobilize● UV Mark Items with your Address and ZIP code● Set a Device Lock● Encrypt your data - TrueCrypt, Bitlocker● Install Tracking Software - Prey Project, Find myiPhone, Android Lost● Ensure your Insurance Schedule is current - scan
  11. 11. The story has a happy ending...
  12. 12. If this can happen to me...... then do you think theres a chance it canhappen to your client?Photo Credit - JazBeck http://www.flickr.com/photos/jazbeck/8025692978/
  13. 13. Questions
  14. 14. How to stay in touch with me● Sign up to my free newsletter -news and strategy for SMB IT companieshttp://tubb.co/MSP-Newsletter● Twitter – www.twitter.com/tubblog● LinkedIn – www.linkedin.com/in/richardtubb(remember to introduce yourself!)● Google+ - http://gplus.to/tubblog● E-Mail (remember that?) – richard@tubblog.co.uk

×