Security Basics mailing list archives

Re: In light of what has happened with the theft of the VA laptop, what are the "best practices" for securing laptops?


From: Dana <dmorrow5 () satx rr com>
Date: Tue, 13 Jun 2006 11:13:35 -0500

My two cents....

The data should have never been on the laptop in the first place! If work is necessary, VPN into the network. Work while on the road? Same thing. Why should the security of the information be subject to the easy of accessibility in an airport/home, elsewhere?

regards,

Dana




Mike Foster wrote:
In light of what has happened with the theft of the VA laptop, what are the "best practices" for securing laptops?  Am 
curious how all of you feel about the options.

How do  you feel and/or what is your experience with:
--Power-on passwords in the hardware/CMOS/BIOS Setup
--Hard drive locking passwords in the hardware/CMOS/BIOS Setup
--Laptops equipped with fingerprint readers for the above two options
--Windows NTFS EFS encryption
--TrueCrypt from www.truecrypt.org for encrypted storage areas
--Trusted Platform Module (TPM) https://www.trustedcomputinggroup.org
--Tokens that plug into USB
--Others?

Thank you in advance...



Current thread: