Hot Hardware
Rise of corporate laptop thefts creates need for increased security.
May 31, 2006 at 08:00 PM
6 minute read
It had been a long day in Palo Alto, Calif., for a Fidelity Investments employee. On a routine business trip to meet with clients at Hewlett-Packard, he was finally getting some much-needed downtime. Joining several colleagues for dinner at a Chinese restaurant, he decided to relax after a stressful day. His day, though, was about to get much worse.
In the parking lot, a laptop sat in his unlocked rental car. Its hard drive contained information about 196,000 current and former HP employees, including their names, addresses, Social Security numbers and dates of birth–all the fundamental ingredients for an identity heist of gigantic proportions.
Three hours later, when dinner ended, the employee returned to the car. Peering at the empty space where his laptop should be, he suddenly realized his routine business trip was about to make front-page news.
Fidelity publicized this true-life horror story on March 23. Fidelity's loss and other recent laptop thefts paint a picture of a growing problem. As mobility becomes the status quo, corporate laptop use has increased and with it, so has laptop theft.
To help companies avoid the legal and financial liabilities associated with laptop theft, technology providers have rolled out a variety of solutions. Some secure the content of a laptop's hard drive. Others aid in tracking and recovering the stolen equipment. Such solutions can help protect a company's reputation.
“A company may be able to avoid legal liability, but they can never escape the embarrassment factor,” says Brad Gross, a partner at Becker & Poliakoff. “That's something that haunts them forever.”
Data Lockdown
Like Fidelity, many companies have suffered the after-effects of laptop theft. The same month as the Fidelity fiasco, laptop theft befell Ernst & Young and Verizon Communications. Within one year, Boeing had two laptops stolen.
According to the 2005 Computer Security Institute/FBI Computer Crime and Security Survey, laptop theft losses for 2005 topped $4 million while the total loss due to theft of proprietary information increased to nearly $31 million.
It's not the loss of the hardware that's striking a blow to corporations. It's the possibility that a theft will result in lawsuits and potential fines for violating state and federal laws governing the protection of employee and customer data.
Experts agree that the best practice when it comes to laptop security is to use a layered approach that establishes multiple barriers to unauthorized access. At its root, any robust security solution should begin with some level of disk encryption.
“Because the data on the device is probably worth more than the device itself, encryption is probably the most important thing that people should do before they start layering on other technologies,” says Eric Skinner, vice president of product management at EnTrust, an Addison, Texas-based provider of encryption technologies.
Encryption protects data via a complex, virtually unsolvable algorithm. Only those with the correct password, or fingerprint if a machine has biometric technology, can read the data.
But encryption alone may not be sufficient. Users can easily compromise password protection.
“A password is something people could share,” says Dan Pfeifle, senior director of Tel Aviv-based Aladdin Knowledge Systems. “So using just encryption software is like building a castle but leaving a backdoor open.”
To ensure users can't bypass encryption security, companies can implement two-factor authentication, which uses encryption technology as well as smartcards, such as Aladdin's eToken.
“Two-factor authentication is like using an ATM card,” Pfeifle says. “You aren't getting money if you just drive up and enter in a password, and you aren't getting money out if you just insert your ATM card and can't provide the pin.”
Two-factor authentication doesn't have to be expensive. EnTrust's encryption technology runs about $100 per user, but lowers in price as the volume of licenses increases, while eToken costs about $60 a seat.
Track And Recover
Companies wanting to go above and beyond data security also can enlist solution providers to help track and recover stolen hardware.
Recovering a stolen laptop is a multi-tiered process that involves the courts, police, subpoenas and warrants. Maneuvering through the system can be difficult. Software providers such as Nashville-based CyberAngel Security Solutions Inc. and Vancouver-based Absolute Software Corp. will navigate the recovery for you.
The available solutions are very similar. The vendor offers an application that companies install on laptops. When a company reports a machine stolen, a monitoring center remotely accesses the laptop, telling the application to contact it every few minutes via any Internet connection the laptop can establish. This allows monitors to capture essential information such as the IP address, the Windows login information and the current e-mail user information.
This ability for the laptop to find connectivity and call the monitoring center is vital for laptop recovery.
“The key is to not lock up network connectivity,” says Bradley Lide, president of CyberAngel. “A nonoperational machine has little value for a thief. They'll just chop it up for parts and throw it into a dumpster. If connectivity is established, we can track it.”
Once the vendor retrieves the information, it can determine the location of the laptop and call area police.
“You may ask why in the world would police help recover a stolen laptop when they have a million other things to investigate,” says Ben Haidri, vice president of marketing at Absolute Software. “But we have a recovery team made up of ex-police officers who know how to talk to other cops.”
Such tracking and recovery solutions are relatively cheap, costing roughly $55 per user.
Fidelity Fallout
Although laptop recovery and encryption solutions wouldn't have prevented Fidelity's incident of theft, it may have allowed the company to rest easier.
To Fidelity's credit, the company had equipped the stolen laptop with some security barriers, such as encryption software. Still the company has had to undertake the arduous task of notifying all affected HP employees and setting up a special phone line to answer customers' questions regarding the theft. It also has offered free credit monitoring to those affected.
Possibly the most important lesson from the Fidelity fiasco is to watch what you put on a laptop.
“Organizations need to be asking themselves should we even be storing that information locally on a laptop,” says Richi Jennings, a lead analyst at Ferris Research. “Most likely the answer is that the information should not have been stored on a laptop in the first place.”
But if an employee really needs to keep such sensitive information on his or her computer, then encryption and laptop recovery services are a worthwhile investment.
“Physical prevention is just wasting your time because people are people, and they are going to do stupid things,” Jennings says. “Companies should think about what they can do technologically to protect the data once it is stolen.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllUS Reviewer of Foreign Transactions Sees More Political, Policy Influence, Say Observers
Pre-Internet High Court Ruling Hobbling Efforts to Keep Tech Giants from Using Below-Cost Pricing to Bury Rivals
6 minute readPreparing for 2025: Anticipated Policy Changes Affecting U.S. Businesses Under the Trump Administration
Senate Panel Postpones Vote on Reconfirmation of Democrat Crenshaw to SEC
Trending Stories
- 1Call for Nominations: Elite Trial Lawyers 2025
- 2Senate Judiciary Dems Release Report on Supreme Court Ethics
- 3Senate Confirms Last 2 of Biden's California Judicial Nominees
- 4Morrison & Foerster Doles Out Year-End and Special Bonuses, Raises Base Compensation for Associates
- 5Tom Girardi to Surrender to Federal Authorities on Jan. 7
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250