Device Security
Last updated: APRIL 2019
ANTI-THEFT
Kensington Locks
WHAT: A Kessington lock is similar to a bicycle lock especially designed for your device. It is a security device that attaches a cable from your device to a stationary object such as a table.
USEFUL FOR: Discouraging the casual theft of your devices in a shared office or in public areas such as cafes or airports.
PLATFORM: Most manufacturers design computers with a Kensington slot compatible with a Kessington lock.
COST: Variable.
DIFFICULTY: Easy.
LIMITS: Kessington lock are designed to deter quick grab-and-run thefts of equipment. They can, however, be torn out or cut if an individual has the opportunity and time, though not without causing significant damage to the case or drawing unwanted attention.
LEARN MORE: Kensington Laptop and Computer Locks Explained.
Prey
WHAT: Open source, remote device tracking, wipe and encryption software.
USEFUL FOR: Tracking your devices, locating them in case of theft and (paid version) remotely wiping the data in them.
PLATFORM: Works across platforms, on computers and mobile devices.
COST: Variable. The free plan allows for tracking up to 3 devices.
DIFFICULTY: Medium.
LIMITS: Remote wiping of data needs an upgrade to the paid version, starting at $5/month
JURISDICTION: U.S.A.
LEARN MORE: How it works.
ANTIVIRUS
Clam AV
WHAT: Open source, multi-platform antivirus software.
USEFUL FOR: Detecting trojans, viruses, malware & other malicious threats.
PLATFORM: Desktop, available across platforms.
COST: Free.
DIFFICULTY: Hard.
ANTI-RANSOMWARE
The No More Ransomware Project
WHAT: An effort by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and McAfee (an antivirus company) aimed at helping victims of ransomware retrieve their encrypted data without having to pay the criminals.
The project also aims to educate users about how ransomware works and what countermeasures can be taken to effectively prevent infection.
USEFUL FOR: If you have been infected with one of the listed (unlocked) types of ransomware, the website guides you through the steps to decrypt your files and devices.
COST: Free.
DIFFICULTY: Variable.
DATA DELETION AND DISK WIPE
DBAN
WHAT: Open-source program that destroys (or wipes) all data in a computer’s hard drive.
USEFUL FOR permanently erasing all the data (all the programs and files) in a computer including the operating system.
PLATFORM: Windows.
COST: Free.
DIFFICULTY: Hard.
LEARN MORE on how and when to use DBAN.
ERASER
WHAT: Open-source, lightweight program that destroys data.
USEFUL FOR permanently erasing files in your computer.
PLATFORM: Windows.
COST: Free.
DIFFICULTY: Easy.
LEARN MORE: Watch a video tutorial.