Skip to content

Latest commit

 

History

History
140 lines (63 loc) · 3.77 KB

devices.md

File metadata and controls

140 lines (63 loc) · 3.77 KB

Device Security

Last updated: APRIL 2019


ANTI-THEFT

WHAT: A Kessington lock is similar to a bicycle lock especially designed for your device. It is a security device that attaches a cable from your device to a stationary object such as a table.

USEFUL FOR: Discouraging the casual theft of your devices in a shared office or in public areas such as cafes or airports.

PLATFORM: Most manufacturers design computers with a Kensington slot compatible with a Kessington lock.

COST: Variable.

DIFFICULTY: Easy.

LIMITS: Kessington lock are designed to deter quick grab-and-run thefts of equipment. They can, however, be torn out or cut if an individual has the opportunity and time, though not without causing significant damage to the case or drawing unwanted attention.

LEARN MORE: Kensington Laptop and Computer Locks Explained.

WHAT: Open source, remote device tracking, wipe and encryption software.

USEFUL FOR: Tracking your devices, locating them in case of theft and (paid version) remotely wiping the data in them.

PLATFORM: Works across platforms, on computers and mobile devices.

COST: Variable. The free plan allows for tracking up to 3 devices.

DIFFICULTY: Medium.

LIMITS: Remote wiping of data needs an upgrade to the paid version, starting at $5/month

JURISDICTION: U.S.A.

LEARN MORE: How it works.


ANTIVIRUS

WHAT: Open source, multi-platform antivirus software.

USEFUL FOR: Detecting trojans, viruses, malware & other malicious threats.

PLATFORM: Desktop, available across platforms.

COST: Free.

DIFFICULTY: Hard.


ANTI-RANSOMWARE

WHAT: An effort by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and McAfee (an antivirus company) aimed at helping victims of ransomware retrieve their encrypted data without having to pay the criminals.

The project also aims to educate users about how ransomware works and what countermeasures can be taken to effectively prevent infection.

USEFUL FOR: If you have been infected with one of the listed (unlocked) types of ransomware, the website guides you through the steps to decrypt your files and devices.

COST: Free.

DIFFICULTY: Variable.


DATA DELETION AND DISK WIPE

WHAT: Open-source program that destroys (or wipes) all data in a computer's hard drive.

USEFUL FOR permanently erasing all the data (all the programs and files) in a computer including the operating system.

PLATFORM: Windows.

COST: Free.

DIFFICULTY: Hard.

LEARN MORE on how and when to use DBAN.

WHAT: Open-source, lightweight program that destroys data.

USEFUL FOR permanently erasing files in your computer.

PLATFORM: Windows.

COST: Free.

DIFFICULTY: Easy.

LEARN MORE: Watch a video tutorial.