Monday, October 8, 2012

Sturdy Laptops and Wireless Security

By Allyson Westcot


Many sturdy laptops feature a big assortment of security features built in. Utilize them. You may also use some other systems to help keep the systems secure. A way to keep info on portables from leaking out to others is by using some type of remote server that keeps the data on a cloud without actually being stored on the portables. A stolen computer will not contain any business info that way, as long as the user name and password to the remote info isn't stored in the browser or somewhere any person can access it.

It could also be of benefit to make sure that any information on a laptop can be totally erased remotely in the event of theft. There are a number of remote access services that may be used to access it even if it's stolen, as long as it's on and connected. That will protect delicate business intelligence, too.

Default passwords, logins or SSIDs are straightforward targets for hackers. Change these right away, and be sure to use secure passwords that can't easily be guessed. A mix of letters (both upper and lowercase), numbers and symbols are the best. Longer is better than shorter. Some gurus endorse 15-character randomly generated passwords for the tightest security. Most defaults are short and sometimes very simple, which can allow a trespasser straightforward access.

SSIDs are assigned by the maker of objects like routers. Every one of the same model could have the same string of characters. Using this default SSID for your business network and router is a giveaway to hackers that security possibly isn't that tight, and can make your network a target. Change it.

Also, most rugged laptops and portable gadgets will perceive and connect to Wi-Fi by default. Turn this off. You do not want your PC to spot an open Wi-Fi, connect and have all the information on it compromised by an unsecure wireless network. Also, turn off your connection if you won't be using it for a bit for extra protection.




About the Author:



No comments:

Post a Comment