TITLE

Data, Identity Theft New-age Terror Threats

PUB. DATE
June 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2006, Vol. 43 Issue 6, p74
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The author offers the laptop security best practices provided by John Livingston of Absolute to protect one's enterprise when the unit is lost. Accordingly, the new terror threats that endangered businesses at present are the data and identity theft. To prevent such incidents, the author with Livingston provides a quick checklist including using cable locks as visual deterrents, avoiding leaving unsecured laptops unattended and keeping laptops inconspicuous.
ACCESSION #
21101487

 

Related Articles

  • Notebook theft is skyrocketing: Here's how to prevent it. King, Carla; Bielski, Vince // PCWorld;Jun98, Vol. 16 Issue 6, p161 

    Offers advice for preventing your notebook computer from being stolen. Amount of money that each stolen notebook costs a company, according to a 1998 survey by the San Francisco, California-based Computer Security Institute; Where most notebooks are taken from; The best way to protect your...

  • Powerful Ultra-books for Professionals.  // Dataquest;11/30/2012, Vol. 30 Issue 22, p52 

    The article offers a guide in buying ultra-books for professionals in India which include security features, solid state drives (SSD) and display size.

  • Laptop theft soars; prevention includes lock-downs, RFID.  // Security: Solutions for Enterprise Security Leaders;Feb2000, Vol. 37 Issue 2, p55 

    Reports on the actions taken by computer and security systems manufacturers to address the problem in laptop computer theft in the United States. Linking of laptop computer into a card access control system; Tracking system in case they are stolen; Locking down of laptops.

  • Grand theft laptop. Sheremata, Davis // Alberta Report / Newsmagazine;07/06/98, Vol. 25 Issue 29, p24 

    Discusses the theft of laptop computers in Edmonton. Computers stolen from office buildings; Difficulty investigating these crimes; How to store computers; Security devices.

  • Laptop security threats. Green, Carolyn // CMA Management;Jul/Aug2002, Vol. 76 Issue 5, p46 

    Focuses on the implementation of laptop security in Toronto. Factors for the implementation of laptop security; Tips for car travel security; Installation of alarm systems and motion detectors.

  • ASK JAMES. Hunt, James // Micro Mart;10/21/2013, Issue 1283, p126 

    The article presents a question and answer about a laptop computer that fails to boot and the security measures that can be taken before sending it to the retailer for repair.

  • Wireless system secures laptops, other portables.  // Automatic I.D. News;Dec95, Vol. 11 Issue 13, p12 

    Reports on RF Technologies Inc.'s development of a wireless security system to protect laptop computers and other portable devices.

  • Two new products protect your notebook from theft.  // Link-Up;Mar/Apr99, Vol. 16 Issue 2, p28 

    Presents products which protect notebook computers from theft. Features of the TrackIT system and Universal Notebook Security Cable; How the products work; Prices of the products.

  • Stealth laptop.  // Popular Mechanics;Sep95, Vol. 172 Issue 9, p24 

    Reports on liquid-crystal-display (LCD) repair shop Man & Machine's development of a technique that prevents other people from reading what is written on a laptop computer. Use of polarized light that removes text from screen; Restoration of image through polarizing eyeglasses.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics