Member "blackmagic" writes: I am the head of my department and by the nature of the job I hold some confidential information on my laptop.
How do I ensure that:
Member ShalomC writes:
You can minimize your risks by doing the following:
Member LuisHernandez writes:
From my point of view, to avoid that someone else can access your laptop that is connected to internet (or network) requires software but mainly that you follow certain rules and protocols. The best software that fixes your needs and the guidelines, rules or protocol to be implemented, should be determined by the administrator. If you don't trust this person, as has been mentioned previously, the solution requires more thought. In such a case perhaps you need to ask yourself the question: "What do I have to do to trust my administrator?" Maybe you would ask for some help from your security suppliers.
The encryption software usually has a mechanism to get a logging of who, when and that data was visualized.
But remember that the security software and the encryption software even have limitations and it depends on how you follow basic guides/rules to minimize the risk:
- If you don't activate your laptop for 5 minutes the system has to ask a password.
- Your password must be at least 8 characters length as a combination of lower-cases, capitals and numbers.
- Connect your laptop to internet outside your office using VPN.
Member "Maclanachu" writes:
If u r concerned about the LAN admins:
To apply or modify auditing policy settings for a local file or folder
Then do one of the following:
Important: Before setting up auditing for files and folders, you must enable object access auditing by defining auditing policy settings for the object access event category. If you do not enable object access auditing, you will receive an error message when you set up auditing for files and folders, and no files or folders will be audited. For more information about how to enable object access auditing, see "Define or modify auditing policy settings for an event category" in Related Topics.
You must be logged on as a member of the Administrators group or you must have been granted the Manage auditing and security log right in Group Policy to perform this procedure.
To open Windows Explorer, click Start, point to All Programs, point to Accessories, and then click Windows Explorer. For information about how to audit local registry keys, see "Audit activity on a registry key" in Related Topics. After object access auditing is enabled, view the security log in Event Viewer to review the results of your changes. You can set up file and folder auditing only on NTFS drives.
If you see the following:
This means that auditing has been inherited from the parent folder.
Because the security log is limited in size, select the files and folders to be audited carefully. Also, consider the amount of disk space that you want to devote to the security log. The maximum size for the security log is defined in Event Viewer.
Finally, if you can get the budget hang tough for Vista. It has some super duper encryption and stuff that supposedly will make it impossible to get data even if they have physical access. Allegedly.
To read this entire thread and get access to other threads within our ITKnowledge Exchange, click here.
This was first published in July 2006