SlideShare uma empresa Scribd logo
1 de 16
Laptop Security CompuTRACKS
How Bad Is It? 100 Laptopslosteachday in the U.S  16,000 losteachweek in U.S., Europe & U.A.E. 1 in 10 Laptops 33% recovered Ponemon Institute 2009
How Bad Is It? ½ Business Travelers Report their Laptop has Sensitive Data 73% of Corporations had a Data Breach Over a 2 yearPeriod Ponemon Institute 2009
-> Facts Organizations’ main reason for not issuing laptop lock — perceived lack of need.    Employees main reason for not using a laptop lock — forgetfulness  Less than half of laptop locks are used correctly
Cost of a Data Breach $202 per data record breached 285 million records breached in 2009 (Verizon Business Report) Calculatoranyone? $57,570,000,000,000 Or $365,000 per incident for eachcompany (Axcess Report) Onlyreportedbreaches 43% whoexperienced a lossdon’t report them
-> Fact 10.5% of theft is suspected to originate from within the workplace     
Data Costs Averagecost of a lostlaptopis $49,246 (Ponemon Institute, 2009)  80% of the costis in the data If the data is of high value the costmay more than double up to $250,000. ReactiveCosts Security Costs
-> Facts On average it takes more than 9 days to replace a laptop   Organizations underestimate the cost of downtime by 31%
Information Security Levés
-> Facts Well implemented security policies reduce laptop theft by 43%      58% of laptops are stolen from the office and 85% of IT managers suspect internal theft
Security levels by Information
What Can Be Done Don’t Be Stupid! StrongPasswords BIOS Basic input/ Output system
What Can Be Done?	 Strong Windows Password May be the same as the BIOS password Virus & Malware Protection Cloud Data Storage & Backup solutions Internet Stay Away Questionable sites Game Sites
What Can Be Done? Backup Your Data!!!!!!! Routine At Least Weekly Locally to USB External Device (or 2) Carbonite - $55.00 per year Search PC Mag.com for best backup Lojack, GPS Navigator Remote Self-Destruct
WishingisTooLate

Mais conteúdo relacionado

Semelhante a Laptop Security

Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Graeme Cross
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkGert-Jan Bruggink
 
Most Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
Most Noticeable Facts About Cybersecurity – Cyberroot Risk AdvisoryMost Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
Most Noticeable Facts About Cybersecurity – Cyberroot Risk AdvisoryCR Group
 
Top Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesTop Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesRahi Systems
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
21 infamous & expensive software bugs
21 infamous & expensive software bugs21 infamous & expensive software bugs
21 infamous & expensive software bugs99tests
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Port security
Port securityPort security
Port securityborepatch
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_finalTerry Young
 
150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_finalTerry Young
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
IRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET Journal
 

Semelhante a Laptop Security (20)

Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in Cybersecurity
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Assetrax Corporate
Assetrax CorporateAssetrax Corporate
Assetrax Corporate
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
 
How healthy is your computer estate?
How healthy is your computer estate?How healthy is your computer estate?
How healthy is your computer estate?
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
 
Most Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
Most Noticeable Facts About Cybersecurity – Cyberroot Risk AdvisoryMost Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
Most Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
 
Top Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesTop Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center Outages
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
21 infamous & expensive software bugs
21 infamous & expensive software bugs21 infamous & expensive software bugs
21 infamous & expensive software bugs
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Port security
Port securityPort security
Port security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final
 
150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
IRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM Technology
 
El #TsunamiDigital de las redes y lo móvil
El #TsunamiDigital de las redes y lo móvilEl #TsunamiDigital de las redes y lo móvil
El #TsunamiDigital de las redes y lo móvil
 

Mais de BARRY HAMMOND

A social media construct
A social media constructA social media construct
A social media constructBARRY HAMMOND
 
Pointing your power to the next opportunity
Pointing your power to the next opportunityPointing your power to the next opportunity
Pointing your power to the next opportunityBARRY HAMMOND
 
Social media and linkedin
Social media and linkedinSocial media and linkedin
Social media and linkedinBARRY HAMMOND
 
Linkedin the ultimate cheat sheet
Linkedin the ultimate cheat sheetLinkedin the ultimate cheat sheet
Linkedin the ultimate cheat sheetBARRY HAMMOND
 
Beyond networking linkedin
Beyond networking linkedinBeyond networking linkedin
Beyond networking linkedinBARRY HAMMOND
 
Beyond networking linkedin
Beyond networking linkedinBeyond networking linkedin
Beyond networking linkedinBARRY HAMMOND
 
Spectrum of solutions - Mastermind 7L
Spectrum of solutions - Mastermind 7LSpectrum of solutions - Mastermind 7L
Spectrum of solutions - Mastermind 7LBARRY HAMMOND
 
Lacing the Combat Boots of Linkedin
Lacing the Combat Boots of Linkedin Lacing the Combat Boots of Linkedin
Lacing the Combat Boots of Linkedin BARRY HAMMOND
 
linkedin for business x-ray search - crowdsourcing
linkedin for business  x-ray search - crowdsourcinglinkedin for business  x-ray search - crowdsourcing
linkedin for business x-ray search - crowdsourcingBARRY HAMMOND
 
Twitter & Tweets
Twitter & TweetsTwitter & Tweets
Twitter & TweetsBARRY HAMMOND
 
Social Media For Small Business
Social Media For Small BusinessSocial Media For Small Business
Social Media For Small BusinessBARRY HAMMOND
 
Linkedin Company Page
Linkedin Company PageLinkedin Company Page
Linkedin Company PageBARRY HAMMOND
 
Meetup Linked In For Business Applications
Meetup Linked In For Business ApplicationsMeetup Linked In For Business Applications
Meetup Linked In For Business ApplicationsBARRY HAMMOND
 
Meetup~Linked In For Business Applications
Meetup~Linked In For Business ApplicationsMeetup~Linked In For Business Applications
Meetup~Linked In For Business ApplicationsBARRY HAMMOND
 
Candidate Introduction
Candidate IntroductionCandidate Introduction
Candidate IntroductionBARRY HAMMOND
 

Mais de BARRY HAMMOND (19)

A social media construct
A social media constructA social media construct
A social media construct
 
160920ASME
160920ASME160920ASME
160920ASME
 
Pointing your power to the next opportunity
Pointing your power to the next opportunityPointing your power to the next opportunity
Pointing your power to the next opportunity
 
ICRE
ICREICRE
ICRE
 
Social media and linkedin
Social media and linkedinSocial media and linkedin
Social media and linkedin
 
Linkedin the ultimate cheat sheet
Linkedin the ultimate cheat sheetLinkedin the ultimate cheat sheet
Linkedin the ultimate cheat sheet
 
Beyond networking linkedin
Beyond networking linkedinBeyond networking linkedin
Beyond networking linkedin
 
Beyond networking linkedin
Beyond networking linkedinBeyond networking linkedin
Beyond networking linkedin
 
Spectrum of solutions - Mastermind 7L
Spectrum of solutions - Mastermind 7LSpectrum of solutions - Mastermind 7L
Spectrum of solutions - Mastermind 7L
 
Lacing the Combat Boots of Linkedin
Lacing the Combat Boots of Linkedin Lacing the Combat Boots of Linkedin
Lacing the Combat Boots of Linkedin
 
linkedin for business x-ray search - crowdsourcing
linkedin for business  x-ray search - crowdsourcinglinkedin for business  x-ray search - crowdsourcing
linkedin for business x-ray search - crowdsourcing
 
Twitter & Tweets
Twitter & TweetsTwitter & Tweets
Twitter & Tweets
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media For Small Business
Social Media For Small BusinessSocial Media For Small Business
Social Media For Small Business
 
Linkedin Company Page
Linkedin Company PageLinkedin Company Page
Linkedin Company Page
 
Meetup Linked In For Business Applications
Meetup Linked In For Business ApplicationsMeetup Linked In For Business Applications
Meetup Linked In For Business Applications
 
Meetup~Linked In For Business Applications
Meetup~Linked In For Business ApplicationsMeetup~Linked In For Business Applications
Meetup~Linked In For Business Applications
 
Candidate Introduction
Candidate IntroductionCandidate Introduction
Candidate Introduction
 
Interview Hand off
Interview Hand offInterview Hand off
Interview Hand off
 

Laptop Security

  • 1.
  • 3. How Bad Is It? 100 Laptopslosteachday in the U.S 16,000 losteachweek in U.S., Europe & U.A.E. 1 in 10 Laptops 33% recovered Ponemon Institute 2009
  • 4. How Bad Is It? ½ Business Travelers Report their Laptop has Sensitive Data 73% of Corporations had a Data Breach Over a 2 yearPeriod Ponemon Institute 2009
  • 5. -> Facts Organizations’ main reason for not issuing laptop lock — perceived lack of need.   Employees main reason for not using a laptop lock — forgetfulness Less than half of laptop locks are used correctly
  • 6. Cost of a Data Breach $202 per data record breached 285 million records breached in 2009 (Verizon Business Report) Calculatoranyone? $57,570,000,000,000 Or $365,000 per incident for eachcompany (Axcess Report) Onlyreportedbreaches 43% whoexperienced a lossdon’t report them
  • 7. -> Fact 10.5% of theft is suspected to originate from within the workplace    
  • 8. Data Costs Averagecost of a lostlaptopis $49,246 (Ponemon Institute, 2009) 80% of the costis in the data If the data is of high value the costmay more than double up to $250,000. ReactiveCosts Security Costs
  • 9. -> Facts On average it takes more than 9 days to replace a laptop   Organizations underestimate the cost of downtime by 31%
  • 11. -> Facts Well implemented security policies reduce laptop theft by 43%     58% of laptops are stolen from the office and 85% of IT managers suspect internal theft
  • 12. Security levels by Information
  • 13. What Can Be Done Don’t Be Stupid! StrongPasswords BIOS Basic input/ Output system
  • 14. What Can Be Done? Strong Windows Password May be the same as the BIOS password Virus & Malware Protection Cloud Data Storage & Backup solutions Internet Stay Away Questionable sites Game Sites
  • 15. What Can Be Done? Backup Your Data!!!!!!! Routine At Least Weekly Locally to USB External Device (or 2) Carbonite - $55.00 per year Search PC Mag.com for best backup Lojack, GPS Navigator Remote Self-Destruct