Tuesday, July 15, 2008

Education Key in Slowing Laptop Theft

Corporations spend billions of dollars each year repeating the same message over and over. It's called advertising and it works. A similar approach, according to a recent Processor story, stands the best chance of slowing the never ending tide of stolen laptops: Keep telling employees that they have to guard their machines, and keep telling them how to do it.

Security, of course, is not at the forefront of every employee's mind. Indeed, people take dumb chances. They leave machines unattended when they go to the rest room in a public venue. They leave them lying on the front seat of an unlocked car when they run into a store. The theme of the Processor piece is that continually drilling best practices and corporate policies into the heads of employees may gradually mitigate this behavior. It's important because the problem is so big: The Safeware Insurance Agency reports that more than 600,000 machines are stolen annually. About $5.4 billion in proprietary information is lost, and 97 percent of the purloined machines are lost forever.

The story also provides advice on issues tangentially related to stopping theft, such as the importance of management systems to track machines and the use of strong passwords and other strategies to thwart criminals when they do succeed in stealing the machines.

The problem of companies not even knowing if a machine is lost or stolen goes hand-in-hand with theft prevention. The centerpiece of a recent Canadian Technology News story is a study by Absolute Software that spotlights some disturbing malfeasance by respondents: 62 percent say that missing computers aren't even noticed and another 20 percent say that nothing is done about breaches.

Innovative tools are available, however. The bulk of the piece describes how Absolute Software tracks, manages and recovers wayward computers. The story provides a common-sense rationale for use of such software: Regardless of the impact it has on outside criminals, it is certain to chill internal theft simply because employees will know that it is there.

This PC World story reports on a product that is available in the UK. It is a modern-day equivalent of the prologue from the old Mission: Impossible television show, in which the tape detailing the ridiculous assignment Jim and the gang will pull off in 60 minutes (minus commercials) starts burning seconds after delivery its message. In this case, Virtuity's BackStopp will wipe data off hard disks if the machine is taken from an unauthorized area. The surveillance is done via the Internet, Wi-Fi or Global System for Mobile communication or radio frequency identification if the laptop is turned off.

The story adds that if a machine has a Webcam, it can be instructed to take a picture of the presumptive thief and transmit it to the central office. The data destruction procedures, which meet standards set by the U.S. Department of Defense's National Industrial Security Program Operating Manual, occur without alerting the thief.

A somewhat similar initiative, this one in India, is Locate Laptop from Unistal Systems. The software reports its location whenever it logs on. Thus, the owner or his or her company visit a Web portal to get a fix on a stolen machine. The IT Nerd provides a lot of useful links: iAlertU, Laptop Alarm, Lojack For Laptops and, for physically securing a laptop, Kensington Cable. The writer concludes that the best way to stop laptop theft is cutting down the amount of time the machine is left unattended.

There is good news and bad news in all this. The good news is that there is a lot of technology aimed at securing, managing, finding and, when necessary, disabling laptops. The bad news is that there are many people stealing laptops - and many corporate workers who are not paying attention.

Laptop thefts are costly. Read about the cost of Nashville laptop thefts: http://www.itbusinessedge.com/item/?ci=37828

Streamyx Installation Guide
Streamyx
Streamyx Combo 110
Streamyx Business Soho
Streamyx Business Soho
Streamyx Business Enterprise
Streamyx Wireless
Streamyx Kuala Lumpur
Streamyx Combo 2MB
Streamyx Activation Waiver
Streamyx Promotion
Streamyx Combo 90
Broadband Malaysia
Streamyx Business
Streamyx Business Enterprise

Switching Broadband Providers

For millions of broadband users who may be tempted by a better deal from another provider, the fear has always been that of being stuck in an internet-less limbo? waiting until their new service is switched on.

Thankfully, changes to the way switches take place have dramatically improved the situation.

On 14 February 2007, Ofcom introduced a code of conduct for moving between broadband service providers called the MAC Code of Conduct.

If they wish to switch, broadband customers need a Migration Authorisation Code (MAC). The Migration Authorisation Code is a 17 to 19-digit unique identifier code consisting of both letters and numbers.

MACs usually begin with "BBIP", "FTIP", "BBDS", or "BBDP", and consist of 4 letters, 7 numbers (sometimes up to 9), a forward slash, 2 letters, 2 numbers, and 1 final letter.

Once requested, your internet provider should provide you the MAC code within 5 working days. This code will then be valid for 30 days in which the customer may switch broadband providers. While it should not take any longer than 10 working days to switch your broadband, there is no set limit imposed on broadband providers to switch you to a new provider and it can take up to 5 weeks.

Your internet service provider cannot refuse your request for a MAC code and must not charge you for the code either. This was introduced to help ease the process of switching your broadband and also allowing the switch to be done in just a few hours resulting in a temporary loss of internet.

The only exceptions for refusal are as follows:

?The account holder does not comply with standard checks by the ISP
?A contract is already terminated
?The MAC has already been requested
?The ISP has already submitted a cease request
?The ISP is unable to obtain a MAC from ISP whom customer is switching to

These rules were set by Ofcom, although, some broadband providers have been known to bend the rules just a little.

This has led some questions about whether some broadband service providers try and make it as difficult as possible for you to switch.

Even though broadband providers must comply with the rules, most providers will try to convince you to stay. They may question you about who you wish to move to and your reasons why and single out comparisons between themselves and their competitor in an attempt to hold on to you as a customer.

In some cases they may offer you something in return for your loyalty as a customer, for example a free upgrade to a higher level of service.

From your perspective, if you are satisfied with the level of service on offer from your existing provider, it always makes sense to listen to any offers that are made.

However, if you are determined to switch, you should so ?and the new MAC system should make it a lot easier to do so.

If you are interested in taking advantage of current broadband internet technology then you should compare many broadband providers available in your area.

Streamyx Activation Waiver
Streamyx Combo 60
Streamyx Combo 160
Streamyx Combo
Streamyx Home Basic
Streamyx Combo
Streamyx
Streamyx - No rental
Streamyx Registration
Streamyx Business Broadband
Broadband Malaysia
Streamyx Combo 384k
Streamyx Free Modem
Streamyx Kuala Lumpur
Streamyx Home Basic