
Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That’s pretty secure. That’s about as secure as it can get out there. You can do face ID on your laptop with Windows now, and same with Mac. They have a face facial recognition login, always great to activate if you have that option.
Another great thing to do with your laptop is to turn on full disk encryption. On a Mac it’s easy. It’s in system settings. You go, I believe it’s File Vault and you just turn it on. Same with windows. In the control panel, you can enable BitLocker and it will encrypt all the files on your hard drive. We highly advise all of our clients to do this.
Audits that our clients will send over either from one of their vendors or one of their customers is requiring this sometimes. We’ve had a couple from the IRS. We’ve had clients go through financial audits and as part of that, they’ve had to perform an I.T. audit as well.
And that’s always the big question. Do your laptops have encryption enabled? It’s easy to do. It makes it pretty much impossible to read the contents of your hard drive without the encryption key. And that’s the kicker is people are afraid that they’re going to lose the encryption key.
So if we manage it, we’ve got a repository that holds all the encryption keys. So that we can recover one if one’s ever needed. You know that’s our big stickler on laptops, you’ve got to enable that encryption. And then if your laptop gets stolen or lost, you leave it on the plane, somebody grabs it out of your car…
Then you’re safe. It doesn’t mean they can’t format your drive and reload it. They can. But, when they do that, all the files are gone anyway, so you don’t have to worry about it anymore.
Do you need help or have any questions? Give us a call!
Host info
Kelly Herrod, the founder and CEO of Herrod Technology, started the company in 2000 to provide simple IT solutions for small and mid-sized businesses. His personal approach, over 30 years experience and his ability to simplify IT sets him apart in the IT industry.
Thanks for listening! Don’t forget to subscribe on Apple Podcasts, Spotify, Google, or Stitcher. (Or your favorite podcast app.) If you like what you heard, please leave a review on iTunes and share what you liked about the show.
16. Having A Great Relationship With Our Customers Is Key
I can't remember any meeting I've ever sat in with a potential client who asks us about our certifications. Most of our clients don't even know what those certifications are, or what's required to get that certification, and how it applies to them. When I was at EDS,...
15. Multifactor Authentication Could Save Your Bacon
Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...
13. Password Best Practices for Ultimate Security from Hackers
When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...
Related Posts
15. Multifactor Authentication Could Save Your Bacon
Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...
13. Password Best Practices for Ultimate Security from Hackers
When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...
12. Are You Updating Your Hardware and Firmware? You Should Be!
The hardware you use your for businesses, a router and a firewall, switches, wireless equipment, all of this, even though it's hardware it also requires updating to keep security. Typically, for your computer, you have updates for hardware, but other hardware network...
Subscribe for Podcast Announcements and New Episodes, Along with Information Tech and Cybersecurity Tips!
Your email is safe and secure.