Security Basics mailing list archives

Re: In light of what has happened with the theft of the VA laptop, what are the "best practices" for securing laptops?


From: "Eric Furman" <ericfurman () fastmail net>
Date: Tue, 13 Jun 2006 20:55:59 -0400

Exactly. At the 'Large Bank' that I used to work for, the presence of
this type of sensitive data on an employee's laptop would be grounds
for immediate dismissal. And the immediate dismissal of any supervisor
who authorized the presence of such information on a laptop.

On Tue, 13 Jun 2006 11:13:35 -0500, "Dana" <dmorrow5 () satx rr com> said:
My two cents....

     The data should have never been on the laptop in the first place! 
If work is necessary, VPN into the network. Work while on the road? Same 
thing. Why should the security of the information be subject to the easy 
of accessibility in an airport/home, elsewhere?

regards,

Dana




Mike Foster wrote:
In light of what has happened with the theft of the VA laptop, what are the "best practices" for securing laptops?  
Am curious how all of you feel about the options.

How do  you feel and/or what is your experience with:
--Power-on passwords in the hardware/CMOS/BIOS Setup
--Hard drive locking passwords in the hardware/CMOS/BIOS Setup
--Laptops equipped with fingerprint readers for the above two options
--Windows NTFS EFS encryption
--TrueCrypt from www.truecrypt.org for encrypted storage areas
--Trusted Platform Module (TPM) https://www.trustedcomputinggroup.org
--Tokens that plug into USB
--Others?

Thank you in advance...

  

-- 
  Eric Furman
  ericfurman () fastmail net


Current thread: