4 steps to avoid data loss when being robbed

We got robbed, and here’s why we almost don’t care

The other week we were robbed. It was not some cool hack were they stole valuable data and business secrets. This was a physical theft, a traditional break in. During the night, thieves broke in to our office building, raided two floors and swiped up all laptops they could carry…and my LG Urbane smartwatch charger cradle(?!).

When we saw the mess the morning after, we felt sad for a minute, then we fired up some backup laptops and got back to work. I did do some complaining about being forced to file a police report and insurance claim, but when the CSI team came in to swab for DNA I forgot about it.

When we saw the mess the morning after, we felt sad for a minute, then we fired up some backup laptops and got back to work. I did do some complaining about being forced to file a police report and insurance claim, but when the CSI team came in to swab for DNA I forgot about it.

Merely an inconvenience

All we do is cloud, we were born in it and we will never leave. That is why a situation like this is merely an inconvenience than a real problem. Keeping your data safe is important but getting the ability to carry on with work from any device is awesome. Some of our friends in the building are not as cloud focused as we are, and they got some serious problems right now. Not only is some veryvaluable data at risk, but the cost related to this will be huge since they have to spend so much time to fix this instead of working.

We are helping them now so this can be avoided in the future, and their future work will be more efficient and mobile.

This is the first steps to secure the future:

  1. Central control! Make sure to set up central control functions for your company’s cloud accounts. It doesn’t matter if it is Google Apps, Office 365, Dropbox or something similar. Do not use personal/private accounts for work related files and storage solutions. Your admin can then take care of security policies and make sure you’re working according to secure practices.
  2. Passwords. Quite obvious. Be a little creative when setting a password. Setting a really secure password AND remembering it is tough though. Check out these tips and learn why “correct horse staple battery” is a good password. Smartphones have been using fingerprint scanners for a while now and the new Windows Hello uses even more advanced biometrics like fingerprints and iris scanner and facial recognition [see more here]. Read about what we do
  3. Two-factor authentication. Somewhat technical but this is something your IT-admin can activate. It means you need a password and a code to login. The password is entered as usual but the code is usually generated and sent to you exactly when you need it (by SMS or an app). This makes it hard for intruders since they both need to crack your password and get your phone (which of course has a fingerprint lock on it…or at least a pin-code).
  4. Encryption. If you are using Windows 10 Pro, then the Bitlocker encryption function is included. A hard drive can be removed from a laptpo but when the drive is encrypted or “scrambled”, it is kept secure since only someone with the encryption key can unscramble it and read the content. Read here about how to set it up.

Read more on working mobile HERE.


Topics: cloud, mobile, security, data

Posted on November 6, 2015 in cloud, data, mobile, security

Share the Story

About the Author

Back to Top