{"id":73,"date":"2020-02-12T06:08:42","date_gmt":"2020-02-12T06:08:42","guid":{"rendered":"https:\/\/training.inukasystem.com\/?p=73"},"modified":"2020-02-12T14:50:06","modified_gmt":"2020-02-12T11:50:06","slug":"protecting-portable-devices-data-security","status":"publish","type":"post","link":"https:\/\/training.inukasystem.com\/index.php\/73\/2020\/08\/12\/protecting-portable-devices-data-security\/","title":{"rendered":"Protecting Portable Devices: Data Security"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Why do you need another layer of protection?<\/h3>\n\n\n\n<p>Although there are ways to physically protect your laptop, PDA, or other portable device (see\u00a0<a href=\"https:\/\/training.inukasystem.com\/index.php\/2020\/02\/12\/protecting-portable-devices-physical-security\/\">Protecting Portable Devices: Physical Security<\/a>\u00a0for more information), there is no guarantee that it won\u2019t be stolen. After all, as the name suggests, portable devices are designed to be easily transported. The theft itself is, at the very least, frustrating, inconvenient, and unnerving, but the exposure of information on the device could have serious consequences. Also, remember that any devices that are connected to the internet, especially if it is a wireless connection, are also susceptible to network attacks .<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What can you do?<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Use passwords correctly<\/strong>\u00a0\u2013 In the process of getting to the information on your portable device, you probably encounter multiple prompts for passwords. Take advantage of this security. Don\u2019t choose options that allow your computer to remember passwords, don\u2019t choose passwords that thieves could easily guess, use different passwords for different programs, and take advantage of additional authentication methods (see\u00a0<a href=\"https:\/\/training.inukasystem.com\/index.php\/2020\/02\/12\/choosing-and-protecting-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Choosing and Protecting Passwords<\/a>\u00a0and\u00a0<a href=\"https:\/\/training.inukasystem.com\/index.php\/2020\/02\/12\/supplementing-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Supplementing Passwords<\/a>\u00a0for more information).<\/li><li><strong>Consider storing important data separately<\/strong>\u00a0\u2013 There are many forms of storage media, including CDs, DVDs, and removable flash drives (also known as USB drives or thumb drives). By saving your data on removable media and keeping it in a different location (e.g., in your suitcase instead of your laptop bag), you can protect your data even if your laptop is stolen. You should make sure to secure the location where you keep your data to prevent easy access. It may be helpful to carry storage media with other valuables that you keep with you at all times and that you naturally protect, such as a wallet or keys.<\/li><li><strong>Encrypt files<\/strong>\u00a0\u2013 By encrypting files, you ensure that unauthorized people can\u2019t view data even if they can physically access it. You may also want to consider options for full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data.<\/li><li><strong>Install and maintain anti-virus software<\/strong>\u00a0\u2013 Protect laptops and PDAs from viruses the same way you protect your desktop computer. Make sure to keep your virus definitions up to date (see\u00a0<a href=\"https:\/\/training.inukasystem.com\/index.php\/2020\/02\/12\/understanding-anti-virus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Understanding Anti-Virus Software<\/a>\u00a0for more information). If your anti-virus software doesn\u2019t include anti-spyware software, consider installing separate software to protect against that threat.<\/li><li><strong>Install and maintain a firewall<\/strong>\u00a0\u2013 While always important for restricting traffic coming into and leaving your computer, firewalls are especially important if you are traveling and using different networks. Firewalls can help prevent outsiders from gaining unwanted access.<\/li><li><strong>Back up your data<\/strong>\u00a0\u2013 Make sure to back up any data you have on your computer onto a CD-ROM, DVD-ROM, or network (see\u00a0<a href=\"https:\/\/training.inukasystem.com\/index.php\/2020\/02\/12\/good-security-habits\/\">Good Security Habits<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.us-cert.gov\/cas\/tips\/ST05-014.html\">Real-World Warnings Keep You Safe Online<\/a>\u00a0for more information). Not only will this ensure that you will still have access to the information if your device is stolen, but it could help you identify exactly which information a thief may be able to access. You may be able to take measures to reduce the amount of damage that exposure could cause.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Why do you need another layer of protection? Although there are ways to physically protect your laptop, PDA, or other portable device (see\u00a0Protecting Portable Devices: Physical Security\u00a0for more information), there. <a class=\"read-more-link\" href=\"https:\/\/training.inukasystem.com\/index.php\/73\/2020\/08\/12\/protecting-portable-devices-data-security\/\">read more&#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,6],"tags":[30,21],"class_list":["post-73","post","type-post","status-publish","format-standard","hentry","category-it_and_security","category-portable-devices","tag-data-security","tag-portable-devices"],"_links":{"self":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":2,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts\/73\/revisions"}],"predecessor-version":[{"id":89,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts\/73\/revisions\/89"}],"wp:attachment":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/categories?post=73"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/tags?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}