10 Tips To Secure Your Laptop - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure
News
11/18/2007
10:01 PM
David Strom
David Strom
Features
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail
50%
50%

10 Tips To Secure Your Laptop

Whether you're home or on the road, these security steps will help protect you and your computer from wireless scoundrels.

As more people use laptops for their primary work PCs, the chances for being compromised because of wireless miscreants loom large. Here are 10 how-to tips to protect yourself and make the best use of a wireless network, whether you are at home, at work, or in between.




Avoid peer-to-peer connections, like the Linksys one in this example.
(click for image gallery)

1. Make sure you are connecting to the right network.

Although this sounds sort of obvious, I've noticed in my travels that there are lots of unscrupulous people who purposely name their wireless connection "Linksys," or some other common vendor's name, in hopes of getting someone who is less than careful to connect to them. The security industry calls these sorts of conditions "evil twins."

The issue here is that your laptop is set up to automatically connect to a particular access point's Service Set Identifier (SSID) -- so someone who uses a common name can grab a bunch of users who aren't wary. There are also tools (such as AirJack) that an attacker can use to disconnect users from the right access point and have them then connect to his rogue network. (More information about this exploit is available from Nomad Mobile Research Centre.)

When you are out on the road, look carefully at the screen that shows the available network connections, and particularly at the different icons next to the connections. The icon that looks like a light beacon indicates an access point, while the one showing two computers with connecting lines indicates a peer-to-peer connection. These peer-to-peer connections are the ones to avoid. There is also a padlock icon that indicates whether or not an access point is running encryption protocols. In the screen shot above (we use Windows XP for our examples), the "wireless" network is an access point running encryption, while we have mistakenly connected to another computer called "Linksys."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 4
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
sudheerelktronics
50%
50%
sudheerelktronics,
User Rank: Apprentice
10/21/2013 | 12:47:31 PM
re: 10 Tips To Secure Your Laptop
I think you have explained all the above tips in software and hardware security point of view. Amazing tips. I am really thankful to you for sharing these tips as I have no idea about some of the above mentioned tips upto now. I have also seen some other general tips about "how to maintain laptop safely" in the post: http://www.electronicshub.org/.... I hope these are also helpful for laptop users.
News
Rethinking IT: Tech Investments that Drive Business Growth
Jessica Davis, Senior Editor, Enterprise Apps,  10/3/2019
Slideshows
IT Careers: 12 Job Skills in Demand for 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/1/2019
Commentary
Six Inevitable Technologies and the Milestones They Unlock
Guest Commentary, Guest Commentary,  10/3/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
Slideshows
Flash Poll