Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

Tech experts reveal device security tips considered by the military

June 12, 2023 No Comments

SOURCE: Getac

In the age of digital technology, your data is more vulnerable to theft than ever.

According to 2022 Statista data, cybercrime costs us $8.44 trillion and is expected to explode to $23.84 trillion by 2027. Recently, governments have been cracking down on using particular apps, like TikTok, on work devices, leading to growing concern about data privacy.

A 2022 Forbes article states the government/military faces the second-highest number of average weekly cyberattacks, 1,136, up 47% from 2021.

As cyberattacks become more sophisticated and widespread, especially during a climate of unrest, it may become more difficult to detect if you are being targeted until it’s too late.

Experts at rugged computing solutions provider Getac reveal the important security features the military considers to help protect your laptop from hackers and thieves.

Use Multi-Factor Authentication

Multi-factor authentication (MFA) is widely adopted, even for everyday use like email, and is becoming compulsory for government employees. It involves multiple steps to log in. For everyday devices, this will involve a password and face ID or fingerprint reader. Whereas military and federal devices will more commonly use an integrated CAC (common access card) reader, which can be purchased online and used in most devices. MFA strengthens your laptop security because if a hacker obtains your password, they must bypass a second step, which can prevent them from accessing your account.

Remove Data from Unused Devices

The trend among military-grade devices is toward toolless removal/installation of data. This strengthens device security as data will only be present when used, facilitating quick data transfer between two devices. It prevents abandoned/old devices from being used by hackers as the data has been removed. So when you get rid of your old phone, wipe all the data before moving on, as hackers can still target it.

Built-in Anti-Theft Technology

Some devices will have anti-theft tech already built-in. Typically, you install an application that provides device and location data to the tech provider. If your laptop is lost or stolen, they can lock it down so it can’t be accessed. The provider can then determine the location and safely delete your data.

Don’t Forget Physical Security

The must-have physical features are a webcam privacy shutter and a microphone blocker. Taping your microphone won’t do anything. Instead, consider buying a microphone blocker. You can also manage which apps have permission to access your microphone and deny access as necessary.

Dante Conrad a spokesperson for Getac commented: “Data protection is becoming a growing concerrn among consumers and organizations. While everyday users might not need to be as strict as the military, the tips outlined are practical ways to help lower the risk of physical and digital threats to your laptop and enhance your information’s security.”

Getac is a rugged computer solutions provider and has worked with the US Air Force and Red Cross Military Corps to help update military technology and fight better in the digital age. The full suite of Getac products is widely used across the Department of Defense in the U.S., from Field Computing devices, SATCOM terminals, and Fly Away kits to Flight Line operations in the Air Force and Mission Planning across all service branches.

Sorry, the comment form is closed at this time.

ADVERTISEMENT

Gartner

WomeninTech