This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Laptops should not be used for backing up or storing data

Share this article:

Laptops are a poor option for data storage.

 

William Pound, senior director of international operations at Absolute Software, claimed that efficient backup methods should be used as well as tracking and recovery software.

 

Pound said: “Laptops are a tool used to do business, but they do blur into our personal lives as we are also likely to keep personal information on them – everything from bank statements to friends and family's contact details and photographs. So what happens when laptops are lost or stolen?

 

“There is a simple answer - tracking and recovery software which is already installed on most leading laptop manufacturers' devices. This would have meant that, not only could the Duchess's photographs have been backed up automatically, even if they hadn't, they could have been retrieved remotely from the stolen laptop and deleted from it once they had been saved. This would have removed all fears of the pictures getting into the wrong hands.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...