Nine measures to ensure the safety of laptop systems

Source: Internet
Author: User
Tags file system strong password firewall

Now the price of notebook computers is getting cheaper, it has entered the "ordinary people home." The adoption of companies and other units is also increasing. In the enjoyment of its convenience, we also have to pay attention to security issues. Protecting your computer's security is a must, both from a hardware perspective and from a software and data perspective. In particular from the data point of view, the loss of laptops may cost more than the computer. This article will describe the nine measures you can take to protect your laptop, which you can use in any comprehensive conservation program, although you may not be fully employed, but the author suggests a better overall.

Measure One: Encrypt the entire hard drive

We often store a lot of confidential information in our notebooks, and if we accidentally lose our laptop, our sensitive information will be exposed. However, if you use a whole disk encryption technology, such as Seagate to the ASI laptop to provide encryption hard disk, you should not worry about this.

If you are using a Windows Vista operating system, consider using Vista BitLocker Drive Encryption software. If you are using Windows XP or another operating system, you can use a large number of Third-party encryption products on the market. Although you can use Encrypting File System (EFS) to achieve similar goals, full disk encryption provides better protection.

Step Two: Install anti-virus and Anti-spyware software

such as the domestic Jinshan and rising software vendors have provided anti-virus and anti-spyware functions, which than the simple anti-virus software to provide more comprehensive protection. In recent years, spyware has done more damage to businesses than it did at the height of the virus. Many spyware programs install Keylogger and other monitoring software into the user's system to gain access to private information. Laptops are more vulnerable to spyware attacks because they are protected by frequent departures from the company's network firewall.

Step three: Lock your computer (with hardware or software)

Sometimes, a company's employees leave their laptops for a while, and their computers may be in offices, hotels or homes. The sensitive data contained in the computer is easily stolen. If you take a trip with you, I suggest you consider using a secure cable and security lock (such as Kingston's security lock/cable combination). While this does not guarantee that the books will be stolen, it may deter some thieves.

Step four: Install tracking software

You might think about how to get your lost love machine back, and to achieve this, you should install a tracking software that can track where your computer is located. Most laptop tracking software is now installed on a hard drive where it cannot be detected, so the software cannot be removed from the system.

In this way, every time your computer is connected to the Internet, the tracking software will report to the recovery software manufacturer, and the manufacturer will keep track of the physical location of the laptop and notify the relevant organization. According to foreign experience, hardware can actually be recovered in many cases. However, even if the hardware is recovered, users should be concerned about whether the data is compromised.

Some tracking software also includes additional features, such as remote removal of information from a laptop, so if you have sensitive information on your computer, this feature can be a vital part. By virtue of this feature, we are able to delete sensitive data before it falls into the hands of evil.

Step five: Install the software firewall

The software firewall is very helpful to protect the system. This software blocks harmful data communications from the computer. As mentioned earlier, laptops are often taken outside the company, which means they lose protection from corporate firewalls. If you're outdoors using exactly an insecure wireless network, installing a firewall will protect you from attack.

Measure VI: Stay updated

Sometimes patching software is a time-consuming and laborious task, but keeping the software up to date is an extremely important security measure. Timely patches can correct some program errors that can lead to vulnerabilities being exploited. Users may want to implement automated systems, such as Microsoft WSUS (using WSUS services, which allows your operating system to get the latest system patches in time without going abroad, saving you significant traffic costs.) , configure your laptop so that it can update the computer as soon as the patch is available.

Action Seven: Use strong passwords

The author has in the "Network management Staff World" magazine published "Easy to achieve strong password" introduced in the Linux system to implement a strong password method. Passwords have always been the most common way to secure resources, including laptops. As mentioned earlier, since laptops are often brought outdoors, it becomes more important to use a strong password to mitigate the security of local accounts. Make sure all accounts are properly protected, especially the local administrator account.

Measure VIII: Use wireless networks with care

Now the use of wireless networks is more and more extensive. The wireless service has its own insecurity, which means that anyone in the range of the laptop is likely to get all the information you see, perform, and type. Obviously, this is very bad. In this case, the user should try to connect to the company's VPN service and then operate through a wireless connection. After the appropriate VPN is used, communication between the user's laptop and the company is encrypted. If information security is a critical issue, users can only use wireless networks that are secure through WPA or WPA2. Although this is not a perfect solution, it's better than just using WEP.

Action Nine: Disable Windows services that users do not need

Each of the Windows services that a portable computer runs represents an opportunity for a computer to be attacked, especially a service that listens on a specific port. To further protect a laptop that is often roaming, disabling any unwanted service is a good way to go.

Conclusion

Any measure is not an absolute safe medicine and secret ingredient. However, if you like, you might as well buy a piece of insurance for your laptop. This way you can have a computer to use even after you lose it.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.