Absolute Software's Tips For Securing Your Laptop While TravelingAbsolute Software's Tips For Securing Your Laptop While Traveling
Absolute Software provides travel tips to help ensure that your laptop gets to its destination safely and securely this holiday season
November 20, 2008
Vancouver, Canada: November 20, 2008 - Absolute(r) Software Corporation ("Absolute" or the "Company") (TSX: ABT), the leading provider of firmware-based, patented, laptop theft recovery, data protection and IT asset management solutions, has compiled travel tips to help ensure that your laptop gets to your destination with you safely and securely this holiday season.
"With the busy holiday season upon us, people will be taking to the road with their laptops in tow," said John Livingston, Chairman and CEO of Absolute Software. "Unfortunately, many of these people will fall victim to laptop loss or theft. On top of the financial cost, the potential data loss and threat of identity theft associated with a missing laptop can seriously worsen the situation and have far-reaching consequences for individuals and companies alike."
According to a recent study by the Ponemon Institute, 12,000 laptops a week are lost by business travelers alone. And, only 35% of business travelers say they protect the information on their laptop.1 When a laptop goes unclaimed for an extended period of time, the airline in possession of it may send it off to auction. That means the information in the laptop may be up for sale to the highest bidder. So protecting your laptop - and the information on it - becomes vitally important while traveling. To help keep thieves at bay, Absolute advises taking the following 10 steps when traveling with your laptop during the holidays:
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
The Impact of XDR in the Modern SOC