Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Laptop Security by Mind Map: Laptop Security
0.0 stars - reviews range from 0 to 5

Laptop Security

No safe place

Your laptop is not safe laying around. You would not leave cash lying around, so do not leave your laptop laying around. Conferences of any description are a prime target of thieves, as they know that the attendees guards are often down, and will leave laptops laying around. Thieves rely on this false sense of security to steal them.

Cable lock

Most laptops have a Universal Security Slot (USS), also known as a Kensington Security Slot (sometimes referred to as a K-slot or Kensington Slot). Will it stop bolt cutters? Unlikely. Will it stop a casual thief that just happened to be walking past your hotel room while room service had propped the door open, and then gone off to get more towels? Probably. And make sure to secure it around a strong, immovable, indestructible object. Also use it in the office. What percentage of laptop thefts occur in the office? (See below for answer).


Laptops and mobile gadgets like cell phones, PDAs, and USB flash drives have become a necessity in many business settings

And such equipment now spends more time than ever outside the office, as employees work at home or in the nearest Starbucks.

this dramatically increase the likelihood of loss or theft, now that devices are outside corporate premises

laptop thefts out of parked cars and conference rooms may grab headlines

but a far greater number of devices simply get left behind in places like cabs, subways, and airplanes reports that La Guardia airport alone has accumulated more than 70,000 unclaimed laptops and PDAs in its lost and found.

According to Accenture, 10 to 15 percent of all handheld computers, PDAs, mobile phones, and pagers are eventually lost by their owners.

A 2006 Ponemon Institute study reported an 81 percent increase in the number of companies reporting stolen laptops between 2005 and 2006. Even notebooks that never leave the office can be targets, as many thefts are inside jobs.

if you lose your data

According to a 2007 survey by McAfee and Datamonitor, a data breach involving personal customer information could cost a company, on average, $268,000 in reporting expenses--even if the data is never used. And one-third of the companies surveyed said that a major security breach had the potential to put them out of business entirely.

how to greatly reduce loss of device and its data


Use the features of your operating system

Use the BIOS password

Your laptop's serial numbers

Use some form of permanent marking on the laptop

Use the manufacturer's registration scheme

Docking station

Personal firewall


Tracking software

Laptop case

Public places

Air travel

Car travel


Getting the security habit

Checkpoint security

40% of laptop thefts occur in the office

Information freely available on the Web suggests that 97% of stolen laptops are never recovered.

25 April 2007

some tech tips

The FAA recently learned of a hustle that's being employed at airports all across the country to steal laptop computers. It involves two persons who look for a victim carrying a laptop and approaching a metal detector. They position themselves in front of the unsuspecting passenger. They stall until the mark puts the laptop computer on the conveyor belt. Then the first subject moves through the metal detector easily. The second subject sets off the detector and begins a slow process of emptying pockets, removing jewelry, etc. While this is happening, the first subject takes the laptop as soon as it appears on the conveyor belt and moves away quickly. When the passenger finally gets through the metal detector, the laptop is gone. The subject that picks it up heads into the gate area and disappears among the crowd.

Phoenix BIOS TheftGuard is the first theft deterrent application that cannot be removed or replaced merely by installing another hard drive. The solution is digitally registered and installed in the Phoenix cME FirstBIOS and Host Protected Area (HPA), which is a secure environment independent of the operating system. If a registered machine is reported as stolen on the TheftGuard website, the next time the machine is connected to the Internet it will automatically send a signal which will verify it as stolen. The machine can then immediately be disabled, the IP address can be captured for tracking purposes and the data on the hard drive can even be deleted. Since TheftGuard is enabled through Phoenix cME FirstBIOS, the application will still be able to check for integrity of the application components even if a new hard drive is placed in the system. Also it does not depend on the operating system installed.

Homing Pigeon runs fully autonomously, it can get out of networks where browsing is blocked, it can get out of very hostile network situations, it can run periodically if desired, and report a myriad of information about the machine and thief. Also it includes format blocking and format recovery. Best of all, Homing Pigeon has no subscription fee. You buy it once for $39.95, and it will function for life. RC5DES

lots of little solutions


According to Safeware Insurance Agency (, more than 600,000 laptops are stolen every year, which translates into an estimated $5.4 billion loss of proprietary information.

According to the FBI, a whopping 97% of stolen computers never return to their rightful owner.

awareness key

lock down

Act now

Network Sentry

Security, of course, is not at the forefront of every employee’s mind.

Indeed, people take dumb chances

62% not even know laptop is missing