Handling Corporate Laptop Theft Gracefully 197
Billosaur writes "From NPR, we get a Marketplace story about the theft of corporate laptops and the sensitive data they may contain, specifically how to handle the repercussions. From the story: 'TriWest operates in about 21 states. It's based in Phoenix, Arizona. In December of 2002, somebody broke into the company's offices and stole two computer hard drives.And those hard drives contained the personal information of 550,000 of our customers from privates in the military all the way up to the chairman of the Joint Chiefs of Staff.' How they handled the situation earned them an award from the Public Relations Society of America."
Handling Corporate Laptop Theft Gracefully (Score:5, Funny)
Tip 1: When you make your get away, float above the carpet like a feather caught in the wind.
Tip 2: If you encounter security or other obstacles, aim for the biscuits.
Tip 3: Make sure you check the laptop for any homing devices that will help them track you down.
Tip 4: The password is usually the username with 123 at the end or the their children's ages.
Tip 5: Get the evidence out of your hands as quickly as possible to beat the feds.
Tip 6: Relax and enjoy reading the next day's headlines on Slashdot about stolen private information.
Quite impressive... (Score:4, Funny)
You mean they handled the situation (and the laptop) with a single three-fingered hand [publicradio.org]? That is quite impressive.
Creepy though.
Explosives (Score:5, Funny)
Not to stop the criminals.
For the entertainment value
Re:Conscientious Capitalism (Score:2, Funny)
100% Troll
I guess the PR of the Year Award comes with a free subscription to AsTrollTurf Inc.
Corporate policies needed (Score:5, Funny)
There's very little you can do after the fact (though the C4 idea above was cute). The key is to do what somewhere I once worked did: make sure that there are effective corporate policies in place long before hand to make sure that laptop thieves don't profit when they get their hands on sensitive information.
For example:
With a few simple precautions like these, you can be sure that the bad guys may steal the laptop, and the data, but they won't have any more idea what to do with it than you do.
--MarkusQ
Re:Wrong, wrong, wrong... (Score:5, Funny)
Remember kids
Red Dawn + Bluethunder = Purple Rain
Re:Encrypt the disks. (Score:3, Funny)
XOR the data with itself. Since the key is the same length as the data, cryptanalytic attacks don't apply. Anyone who doesn't have the data, by definition, doesn't have the key. The ciphertext contains no clues to the plaintext and, in contrast to most crypto systems, is highly compressible. An additional convenience is that you can generate the ciphertext from one of the standard special devices without even needing the plaintext.
Some might argue that this is a lossy process, but you can always XOR the ciphertext with the key and get back your original data.
Pretty perfect, huh?
(yes of course I'm kidding)