Security Basics mailing list archives

RE: In light of what has happened with the theft of the VA laptop, what are the "best practices" for securing laptops?


From: "Sadler, Connie" <Connie_Sadler () Brown edu>
Date: Tue, 13 Jun 2006 12:27:01 -0400

 
There are also lo-jack type of software packages. We use Cyberangel for
many of our laptops. If one is stolen, we have an 80% chance to recover
it, and the software allows for an encrypted partition where a user can
store their sensitive data.

Connie J. Sadler, CM, CISSP, CISM, GIAC GSLC
Director, IT Security, Brown University
Box 1885, Providence, RI 02912
Office: 401-863-7266



-----Original Message-----
From: Mike Foster [mailto:mike () mytechcoach com] 
Sent: Monday, June 12, 2006 8:49 PM
To: security-basics () securityfocus com
Subject: In light of what has happened with the theft of the VA laptop,
what are the "best practices" for securing laptops?

In light of what has happened with the theft of the VA laptop, what are
the "best practices" for securing laptops?  Am curious how all of you
feel about the options.

How do  you feel and/or what is your experience with:
--Power-on passwords in the hardware/CMOS/BIOS Setup --Hard drive
locking passwords in the hardware/CMOS/BIOS Setup --Laptops equipped
with fingerprint readers for the above two options --Windows NTFS EFS
encryption --TrueCrypt from www.truecrypt.org for encrypted storage
areas --Trusted Platform Module (TPM)
https://www.trustedcomputinggroup.org
--Tokens that plug into USB
--Others?

Thank you in advance...


Current thread: