Tactical Advice

Device Thieves Know No Bounds — Even Ex-Intelligence Agents Are Vulnerable

Ex-MI5 boss has her notebook snatched from right under her nose.
Device Thieves Know No Bounds — Even Ex-Intelligence Agents Are Vulnerable

Notebook theft can happen to anybody. Even those in the spy business.

Ex-MI5 chief Dame Stella Rimington, who is rumored to be the inspiration behind M, a character in the James Bond series, was recently the victim of notebook theft at Heathrow Airport.

Apparently, she left her notebook PC on a luggage cart, where it was then snatched up by a crafty thief. Although Rimington retired from MI5 (the United Kingdom’s security intelligence agency) in 1996, she had contact information for various people affiliated with the agency, which makes the device’s theft somewhat of a national security concern for the United Kingdom.

As unfortunate as Rimington’s loss is, it offers an important lesson on the significant value of mobile device management. Mobile devices have increasingly become the default form factor for computing, which means the risk of losing devices — and the data on those devices — also has increased.

IT worker Jason Holbert recently outlined five tips for preventing notebook theft in a story for BizTech magazine. Two tips, in particular, would’ve been helpful in Dame Rimington’s case:

Invest in Asset-Recovery Technology

Even if a notebook, desktop or tablet is stolen, companies can still protect their data. Consider a solution such as Absolute Software’s LoJack for Laptops, which can be loaded onto a device either at the point of sale or by the end user. Once running, LoJack checks in daily with a central server. If the device is reported stolen, the server can send a command to erase the device and report its location by using either the on-board GPS or IP information. Once that information is obtained, Absolute will share it with local law enforcement.

Protect Sensitive Data with BitLocker

The worst part of having a computer stolen is the threat of sensitive data falling into the wrong hands. Companies using the Enterprise and Ultimate editions of Windows Vista and Windows 7 can avoid that threat by using Windows’ built-in BitLocker technology. In a nutshell, BitLocker can encrypt an entire volume on a given machine’s hard drive, rendering it unreadable without an assigned Trusted Platform Module (TPM) chip, USB key or personal identification number. This will prevent unauthorized access to the contents of the drive, even if it’s removed and mounted in another PC.

Have you ever been the victim of notebook theft? How did you recover the lost data?

Sign up for our e-newsletter

About the Author

Ricky Ribeiro

Online Content Manager

Ricky publishes and manages the content on BizTech magazine's web site. He's a writer, technology enthusiast, social media lover and all-around digital guy. You can learn more by following him on Google+ or Twitter:

Security

Three Ways to Integrate Fire... |
Follow these tips to align the devices with log management and incident tracking systems.
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...
The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...