Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The $160 Million Laptop

August 1, 2006


Forget the notion that laptops are getting cheaper.

The U.S. Department of Veterans Affairs has a laptop and external hard drive, recently recovered by the folks at the FBI, which will cost them and us at least $160 million.

It all started May 3 when a laptop computer and external hard drive were stolen from a residence in Aspen Hills, Maryland. The gear contained birthdates, Social Security Numbers and other personal information on veterans and some military personnel. The bigwigs at VA didn’t know about the loss until May 16, or so they have claimed. Originally, it was thought that 26.5 million veterans were at risk. In late June, the laptop and external drive were recovered, thanks to a $50,000 reward. VA and FBI officials now believe lass than 18 million people’s records were at risk.

In the meantime, however, VA promised to pay for one year’s worth or credit monitoring for all potential people impacted – at a cost of $160 million.

Many incidents

The incident is just one of many involving corporate and government laptop computers gone missing, stolen or compromised.

More corporations are purchasing laptops for their executives and office workers, who have network porting at work but taken the computers home at night. And there’s the concern of vulnerabilities.

Here are seven tips to better secure laptops and their data.

Security leaks are not only caused by data transfer, but by the mobile device itself.

Tip 1: More discipline when on the move.

The only protection against being careless is more care and discipline – but that is difficult when you are under time pressure. A survey conducted by Utimaco Safeware AG with the Lost and Found offices at the ten largest airports revealed airline passengers lost more than 5,000 mobile devices. Particularly at airports with a large number of short-distance routes primarily used by business travelers, several dozen mobile devices are turned in daily, as many as a hundred on heavily traveled days.

Tip 2: Making passwords more difficult to crack.

If the worst happens, and your computer is stolen or lost, there is still hope that your personal data is not all accessible, if the password is difficult enough to crack. A mixture of characters, numbers and letters is considered the most secure – but only if passwords and keys are not stored on the hard disk. For this reason, it is better that the computer prompts for a password before booting– electronic security solutions enable this. This gives an unauthorized user no chance to access the operating system or saved data in any way.

Tip 3: Use hardware to supplement password protection.

Analysts working for the Meta Group have confirmed what IT managers already know: Passwords alone do not provide optimum protection for data. The supplements have been available and in use for years. Special smart cards or tokens, which look just like a USB stick, store key information that is used in combination with a user password to unlock the computer. Only someone who possesses the token and knows the password can access the system and the data saved on it. Alternatively, the user’s biometric data can be stored on a smart card. For authentication, the user’s fingerprint is checked directly on the card, instead of the password.

Tip 4: Secure hibernation mode.

You can set up the system to prompt for the password again when the notebook switches back from the screen saver, or from hibernation mode to normal working mode. This means your data is still secure if the user takes time to stop for a break or make a phone call while in transit.

Tip 5: Set up an electronic safe.

As a basic principle you should never save valuable information without protecting it electronically: important papers are kept in safes. The electronic pendant is a “virtual” disk drive that securely encrypts and stores all its contents. You can very easily set up an electronic safe of this kind on local hard disks and network directories, on the PDA, and also on mobile devices such as USB sticks and smart cards, CD-ROMs and DVDs to provide secure storage of your electronic data.

Tip 6: Implement automatic encryption.

Data transparent encryption is a big help. It runs automatically in the background, without being noticed, so the user does not even have to think about storing data securely.

Tip 7: Restrict plug and play.

Plug and Play is convenient, but can sometimes be dangerous: if someone connects a USB stick, MP3 player or external hard disk drive to a notebook, it is recognized automatically – and it is then easy to start exporting data and passing it on to the wrong people. The alternative is to lock the computer for all memory media apart from the company’s own memory sticks, which cannot be used to run or read programs. This also removes the danger of accidentally loading a worm or virus on your own hard disk if you lend the data medium to someone, and get it back with “dangerous cargo”. In addition you should only use sensitive data on USB sticks when it is encrypted, as the smaller the memory device, the greater the danger that it will get lost or stolen.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • COVID-19 related scams are rising

    COVID-19-related scams have cost Americans more than $160 million

    See More
  • When Is a Laptop Worth $20 Million? When It is a VA Laptop

    See More
  • Stolen Laptop Leads to HIPAA Violation and $1.5 Million Fine

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing