This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Laptops should not be used for backing up or storing data

Share this article:

Laptops are a poor option for data storage.

 

William Pound, senior director of international operations at Absolute Software, claimed that efficient backup methods should be used as well as tracking and recovery software.

 

Pound said: “Laptops are a tool used to do business, but they do blur into our personal lives as we are also likely to keep personal information on them – everything from bank statements to friends and family's contact details and photographs. So what happens when laptops are lost or stolen?

 

“There is a simple answer - tracking and recovery software which is already installed on most leading laptop manufacturers' devices. This would have meant that, not only could the Duchess's photographs have been backed up automatically, even if they hadn't, they could have been retrieved remotely from the stolen laptop and deleted from it once they had been saved. This would have removed all fears of the pictures getting into the wrong hands.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Samsung Galaxy S5 fingerprint scanner 'easily hacked'

Samsung Galaxy S5 fingerprint scanner 'easily hacked'

Single step authentication on Galaxy leaves PayPal accounts open to abuse say German researchers.

MSWin 8.1 users must update or lose security patches

MSWin 8.1 users must update or lose security ...

Organisations run the risk of being left defenceless against attackers unless they upgrade from MS Win 8.1

Communication gap indentified between IT and management

Communication gap indentified between IT and management

Bad news is filtered out of communicaiton to the C-suite and 63 percent of IT staff only start talking after a breach has taken place.