Antitheft
CITS, the Office of Public Safety, and Administrative and Auxiliary Services use Computrace software to secure the university's IT assets. This software offers theft recovery, data protection, and secure asset tracking services for all university-tagged computers.
Capabilities include:
- IT Asset Management: Manage and monitor changes in asset information including user identification, physical location, and installation of software/hardware that may not comply with university regulations
- Data & Device Security: Remotely delete sensitive data on missing computers and produce an audit log of the deleted files to prove compliance with government and corporate regulations
- Geotechnology: Use of GPS or Wi-Fi technology to track assets
- Theft Recovery: Forensically track a stolen computer using investigative techniques while working closely with local law enforcement to recover it
- Service Guarantee: May be eligible to receive up to $1,000 if unable to recover a computer or perform data delete services
Top Ten Laptop Computer Security Recommendations
(as taken from absolute.com)
- Use visual deterrents: a cable lock or other locking mechanism can act as a deterrent to would-be criminals. Although they can be ripped off the plastic exterior of a laptop with a strong tug, they do force some criminals to think twice before taking the risk.
- Avoid leaving unsecured laptops unattended: lock them in cupboards, laptop carts or other secure facilities when not in use. If they must be left in a vehicle, they should be covered up or locked in the trunk.
- Keep laptops inconspicuous: laptops should always be carried in inconspicuous carrying cases, such as backpacks or tote bags, instead of tell-tale laptop bags.
- Use complex passwords and change them regularly: Don’t use simple passwords that can be guessed easily. Always use a combination of numbers and letters and never leave your password in obvious places on or near the computer. As well, password-protect your screensaver to avoid unwanted access to your computer if you’ve stepped away.
- Leverage antivirus software, encryption solutions, anti-spyware and firewalls: prevent unauthorized access and spyware from invading your computer and protect valuable information with data encryption software. Make sure
your systems are properly installed and kept up-to-date. - Back-up valuable data on a scheduled basis: Data backup needs to happen as frequently as possible to minimize the risk to organizations in the event of theft or loss. The information or ‘knowledge’ that is stored on the computer is more valuable than the computer itself.
- Understand the dangers of pirated software and file sharing: both piracy and over-deployment of purchased licenses can lead to significant lawsuits or other financial penalties. Not only is it illegal, but pirated software can increase susceptibility to viruses, trojans and other attacks.
- Stay informed: continue to educate yourself on the tools and techniques used today by cyber criminals as well as the latest scams and other security risks to company data.
- Use asset tracking and recovery software: laptop recovery tools are highly effective, especially those based in the BIOS of computers, such as Computrace LoJack for Laptops by Absolute
Software. They not only recover the hardware, but stop the root cause of internal theft by catching the thieves. And regulatory compliance today
requires that companies know not only what is on a computer, but where it is, and who is using it. - Invest in advanced data protection: leverage advanced data protection technology to remotely wipe sensitive information in the event that your computer is lost, stolen or nearing the
end of its lifecycle.