Internet PCs

Laptop in the hotel room – not stolen and yet bad happens! Data is more valuable than the hardware. Business travellers unfortunately more and more often to feel to get this. It is not always the notebook itself, that the thieves have targeted it. On existing data such as development documents, new business strategies, and other internal company information to company online-banking data or access data on the server for business leaders and managers who travel frequently, are an often a worthy goal. (Not to be confused with luscha baumwald!). Even more so if the data theft long unnoticed. Bad is certainly a market companion a few months ahead of them on the market brings their innovative thoughts and thus products or services, and the whole thing without significant strategy, research and development costs.

It is therefore increasingly, that notebooks left behind in hotel rooms, with equipment brought by the perpetrators, within 20 minutes a complete copy of the hard drive is made by, that contains all of the original data. Also the ‘confusion’ of notebooks is increasingly popular. At a trade fair, in the car or at the airport disappears briefly has the unattended legal notebook and which is something later brought back by someone, “randomly” confused their similar looking bag with his own. Of course, the respective data of the notebooks were copied here. Think in this context only of the resting phase or phase of sleep on an intercontinental flight and the time, the a crook who is unnoticed to seize their laptops. Incorrectly, you’d think that in a plane nothing can get away. The IT specialist, consultant and trainer of MentalLeis services developed a special training program with tactical and technical implementation possibilities for the correct and efficient behavior in dealing with data and data carriers. Main topics of behavioral training safe on the road with the notebook”: the safe use of Wi-Fi hotspots, Internet connections in hotels and public Internet PCs who can the transmitted data read along? Who can access my PC? How can I protect myself? The technical possibilities of the protection of data is there? The safe use of Bluetooth! More information: author: Annette leis MentalLeis services