• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Stephen Foskett
      • My Publications
        • Urban Forms in Suburbia: The Rise of the Edge City
      • Storage Magazine Columns
      • Whitepapers
      • Multimedia
      • Speaking Engagements
    • Services
    • Disclosures
  • Categories
    • Apple
    • Ask a Pack Rat
    • Computer History
    • Deals
    • Enterprise storage
    • Events
    • Personal
    • Photography
    • Terabyte home
    • Virtual Storage
  • Guides
    • The iPhone Exchange ActiveSync Guide
      • The iPhone Exchange ActiveSync Troubleshooting Guide
    • The iPad Exchange ActiveSync Guide
      • iPad Exchange ActiveSync Troubleshooting Guide
    • Toolbox
      • Power Over Ethernet Calculator
      • EMC Symmetrix WWN Calculator
      • EMC Symmetrix TimeFinder DOS Batch File
    • Linux Logical Volume Manager Walkthrough
  • Calendar

Stephen Foskett, Pack Rat

Understanding the accumulation of data

You are here: Home / Everything / Personal / Physical Security for the Road Warrior

Physical Security for the Road Warrior

November 30, 2008 By Stephen 2 Comments

You can never be totally secure, but basic precautions can help
You can never be totally secure, but basic precautions like this simple cable lock for laptops can help

This is part of an ongoing series of longer articles I am posting on Sundays.

In this digital age, it is easy to overlook the critical element of physical security. Put simply, it is often far more efficient to steal or gain access to a physical object like a laptop or flash drive than to break into a computer system. And despite the sanitary and controlled environments many mobile employees often travel in, risks to personal safety are real. Therefore, it is sensible to consider the physical security needs of the road warrior.

Protecting Your Data

Road warriors love gadgets, but so do thieves. According to a 2008 Ponemon Institute study for Dell, over 12,000 laptop computers are lost in US airports each week, and 70% of these are never reclaimed. Other studies have shown similar losses at public places like restaurants, hotels, and parking lots. Thumb drives, portable hard drives, and smart phones share the top of the most-stolen list with laptop computers.

Portable drives are particularly easy to snatch
Portable drives are particularly easy to snatch

Because these are often crimes of opportunity, the simplest protective measure is to keep these devices under ones personal control at all times. Never ask a stranger to watch your bag, and do not leave computers or peripherals unattended in conference rooms or hotels.

Special care is needed when passing through airport security: Never put your laptop or other valuable items through the scanner first, since you may be delayed while passing through the metal detector. Instead, place them in the middle or rear of your items so they will remain inside the x-ray machine until you emerge on the other side to retrieve them.

Most hotel rooms have safes available, and these should be used whenever you must leave your laptop or other valuables behind. Although they are not foolproof, they are much more secure than car trunks, cable locks, or bell desks. If a safe is not available or is too small, use a Kensington-type lock to secure your laptop computer to a bulky and sturdy object like a desk. These will not stop a determined thief, but should be enough to discourage a snatcher.

Protecting Yourself

Many of us wrongly assume we are safe in the familiar surroundings of offices, hotels, airports, and restaurants. The rolling suitcase, airline ticket, and laptop bag marks us as targets even in these environments, and serve as enticing evidence of loot to be had.

One of the best ways of protecting one’s safety when traveling is always to be aware and prepared. Get directions ahead of time instead of asking, staring at your PDA or GPS, or driving around. Consider whether your surroundings put you at risk: Select hotels in safer neighborhoods or where access is more controlled. Avoid public transportation when toting cumbersome bags, even if you would happily take the bus or subway alone. Spending a bit more money is preferable to losing your valuables or coming to harm.

When you are away from the office or hotel, dress like a local and watch out for too-friendly strangers. Most people are helpful to others, but avoid those who ask prying questions of offer extravagant services. Con-men often prey on travelers, waiting near hotels, airports, and offices. For example, never take an un-licensed limousine or taxi since these nearly always end up being more costly or risky than desired.

Business travel can be enjoyable, but one must always be careful to avoid becoming a victim!

You might also want to read these other posts...

  • How To Connect Everything From Everywhere with ZeroTier
  • Liberate Wi-Fi Smart Bulbs and Switches with Tasmota!
  • Electric Car Over the Internet: My Experience Buying From…
  • Introducing Rabbit: I Bought a Cloud!
  • Running Rabbits: More About My Cloud NUCs

Filed Under: Personal Tagged With: Dell, digital nomad, security, Sunday series

Primary Sidebar

Private information is practically the source of every large modern fortune.

Oscar Wilde

Subscribe via Email

Subscribe via email and you will receive my latest blog posts in your inbox. No ads or spam, just the same great content you find on my site!
 New posts (daily)
 Where's Stephen? (weekly)

Download My Book


Download my free e-book:
Essential Enterprise Storage Concepts!

Recent Posts

How To Install ZeroTier on TrueNAS 12

February 3, 2022

Scam Alert: Fake DMCA Takedown for Link Insertion

January 24, 2022

How To Connect Everything From Everywhere with ZeroTier

January 14, 2022

Electric Car Over the Internet: My Experience Buying From Vroom

November 28, 2020

Powering Rabbits: The Mean Well LRS-350-12 Power Supply

October 18, 2020

Tortoise or Hare? Nvidia Jetson TK1

September 22, 2020

Running Rabbits: More About My Cloud NUCs

September 21, 2020

Introducing Rabbit: I Bought a Cloud!

September 10, 2020

Remove ROM To Use LSI SAS Cards in HPE Servers

August 23, 2020

Test Your Wi-Fi with iPerf for iOS

July 9, 2020

Symbolic Links

    Featured Posts

    vSphere 6: NFS 4.1 Finally Has a Use?

    February 3, 2015

    Why Are PCIe SSDs So Fast?

    June 12, 2013

    The Terrifying True Story Of Virtual Machine Mobility

    December 22, 2011

    Scaling Storage Is Hard To Do

    June 4, 2013

    The Four Horsemen of Storage System Performance: The Rule of Spindles

    August 25, 2010

    It’s Time To Speak Out Against Sexism In IT Recruiting

    May 6, 2013

    The Prime Directive of Storage: Do Not Lose Data

    December 12, 2014

    Go Get a ProtonMail Account and Protect Your Online Life!

    July 19, 2017

    Electric Car Over the Internet: My Experience Buying From Vroom

    November 28, 2020

    Infographic: Real-World Port Throughput Relative To Thunderbolt (Formerly Light Peak)

    February 21, 2011

    Footer

    Legalese

    Copyright © 2022 · Log in