SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Why I became interested in device
protection
• December 2011
• Presenting at Autotask User
Group in UK to 100+ people
• As I'm due to go on stage I
realised my laptop had been
taken
• And yes, the presentation
was on the laptop...
Six Best Practices
for Complete Laptop
Protection
Richard Tubbs
Providing Expert Advice to Help IT Companies Grow
www.tubblog.co.uk
Agenda
• My story - why I became interested in device
protection
• The six lessons for device security
• The best free software to help you recover
lost or stolen devices
• Why your clients are probably unprepared
for endpoint losses
• How to make endpoint protection a business
opportunity Feel free to ask questions in the Web
Chat, or by Twitter @tubblog
Why I became interested in device
protection
• December 2011
• Presenting at Autotask User
Group in UK to 100+ people
• As I'm due to go on stage I
realised my laptop had been
taken
• And yes, the presentation
was on the laptop...
Lesson Number 1 - Keep your data
backed up
Lesson Number 2 - Know how to
quickly access your backups
Lesson Number 3 - Maintain an
accurate record of your assets
Lesson Number 4 - Your Data is
more valuable than your Hardware!
Lesson Number 5 - Install Tracking
Software on your mobile devices
Lesson No 6 - Make sure your
insurance schedule is current
In Summary
• Keep your Data Backed Up – eFolder, or other business-
grade backup or cloud file sync
• Know how to quickly access your backups - KeePass,
LastPass
• Maintain accurate asset register - Make/Model, Serial No
• Register your items with Immobilize
• UV Mark Items with your Address and ZIP code
• Set a Device Lock
• Encrypt your data - TrueCrypt, Bitlocker
• Install Tracking Software - Prey Project, Find my iPhone,
Android Lost
• Ensure your Insurance Schedule is current - scan receipts
and store them electronically
The story has a happy ending...
If this can happen to me...
... then do you think there's a chance it can
happen to your client?
Photo Credit - JazBeck
http://www.flickr.com/photos/j
azbeck/8025692978/
Questions
How to stay in touch with me
• Sign up to my free newsletter - news and strategy for
SMB IT companies: http://tubb.co/MSP-Newsletter
• Twitter – www.twitter.com/tubblog
• LinkedIn – www.linkedin.com/in/richardtubb
(remember to introduce yourself!)
• Google+ - http://gplus.to/tubblog
• E-Mail (remember that?) – richard@tubblog.co.uk

Contenu connexe

Similaire à eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection

Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011John Mayfield
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRBJohn Mayfield
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...Jisc
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Vanguard Visions
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Vanguard Visions
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5EmanuelePristera
 
Serianu - Data security
Serianu - Data securitySerianu - Data security
Serianu - Data securityMyles Freedman
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance WorldEvan Francen
 

Similaire à eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection (20)

Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5
 
Serianu - Data security
Serianu - Data securitySerianu - Data security
Serianu - Data security
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 

Plus de Dropbox

How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...Dropbox
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...Dropbox
 
Setting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesSetting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesDropbox
 
eFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityeFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityDropbox
 
New Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksNew Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksDropbox
 
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...Dropbox
 
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinesseFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinessDropbox
 
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARseFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARsDropbox
 
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRseFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRsDropbox
 
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...Dropbox
 
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014Dropbox
 
eFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoeFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoDropbox
 
eFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingeFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingDropbox
 
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...Dropbox
 
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...Dropbox
 
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SynceFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SyncDropbox
 
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncFive Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncDropbox
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NowDropbox
 
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationeFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationDropbox
 
HTG Lunch and Learn, eFolder Continuity Cloud
HTG Lunch and Learn, eFolder Continuity CloudHTG Lunch and Learn, eFolder Continuity Cloud
HTG Lunch and Learn, eFolder Continuity CloudDropbox
 

Plus de Dropbox (20)

How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
 
Setting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesSetting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 Minutes
 
eFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityeFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit Opportunity
 
New Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksNew Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with Playbooks
 
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
 
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinesseFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
 
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARseFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
 
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRseFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
 
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
 
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
 
eFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoeFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor Demo
 
eFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingeFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands Briefing
 
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
 
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
 
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SynceFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
 
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncFive Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationeFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
 
HTG Lunch and Learn, eFolder Continuity Cloud
HTG Lunch and Learn, eFolder Continuity CloudHTG Lunch and Learn, eFolder Continuity Cloud
HTG Lunch and Learn, eFolder Continuity Cloud
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection

  • 1. Why I became interested in device protection • December 2011 • Presenting at Autotask User Group in UK to 100+ people • As I'm due to go on stage I realised my laptop had been taken • And yes, the presentation was on the laptop...
  • 2.
  • 3. Six Best Practices for Complete Laptop Protection Richard Tubbs Providing Expert Advice to Help IT Companies Grow www.tubblog.co.uk
  • 4. Agenda • My story - why I became interested in device protection • The six lessons for device security • The best free software to help you recover lost or stolen devices • Why your clients are probably unprepared for endpoint losses • How to make endpoint protection a business opportunity Feel free to ask questions in the Web Chat, or by Twitter @tubblog
  • 5. Why I became interested in device protection • December 2011 • Presenting at Autotask User Group in UK to 100+ people • As I'm due to go on stage I realised my laptop had been taken • And yes, the presentation was on the laptop...
  • 6. Lesson Number 1 - Keep your data backed up
  • 7. Lesson Number 2 - Know how to quickly access your backups
  • 8. Lesson Number 3 - Maintain an accurate record of your assets
  • 9. Lesson Number 4 - Your Data is more valuable than your Hardware!
  • 10. Lesson Number 5 - Install Tracking Software on your mobile devices
  • 11. Lesson No 6 - Make sure your insurance schedule is current
  • 12. In Summary • Keep your Data Backed Up – eFolder, or other business- grade backup or cloud file sync • Know how to quickly access your backups - KeePass, LastPass • Maintain accurate asset register - Make/Model, Serial No • Register your items with Immobilize • UV Mark Items with your Address and ZIP code • Set a Device Lock • Encrypt your data - TrueCrypt, Bitlocker • Install Tracking Software - Prey Project, Find my iPhone, Android Lost • Ensure your Insurance Schedule is current - scan receipts and store them electronically
  • 13. The story has a happy ending...
  • 14. If this can happen to me... ... then do you think there's a chance it can happen to your client? Photo Credit - JazBeck http://www.flickr.com/photos/j azbeck/8025692978/
  • 16. How to stay in touch with me • Sign up to my free newsletter - news and strategy for SMB IT companies: http://tubb.co/MSP-Newsletter • Twitter – www.twitter.com/tubblog • LinkedIn – www.linkedin.com/in/richardtubb (remember to introduce yourself!) • Google+ - http://gplus.to/tubblog • E-Mail (remember that?) – richard@tubblog.co.uk