Letter to the editor

We all should be alarmed about the loss of laptop computers at government agencies ["Laptops lost, stolen at Justice"]. But this is nothing new.

In 2000, a laptop was stolen from a State Department conference room by a stranger who simply walked into the building. Since then, laptop thefts nationwide have increased more than 50 percent. Based on estimates I've seen, about 1,600 units are stolen each day in this country.

But theft of the physical device is only part of the problem. Protecting the data stored on notebooks is the real issue. Also, a notebook can be used to gain access to networks because laptops sometimes contain remote-access log-in scripts, e-mail addresses and passwords. So protecting notebooks also means protecting networks.

What makes data theft insidious and frightening is that we may never know that someone has gained unauthorized access to sensitive information. Remember: If a person can steal a laptop, that same person can probably download information from a laptop without ever stealing the hardware. Think about it. Who is watching your laptop at the office when you go out to lunch? Who is guarding your data when you're on a road trip and you leave your computer in your hotel room?

The range of techniques available to protect computers and data is very broad — and surprisingly simple. Security cables, alarms (motion-sensor alarms are available, to answer a letter to the editor dated Aug. 21), equipment tagging, data encryption software and access control technologies are a few.

But the important point is that more than one technology should be used.

For instance, use a physical lock, which is easily displayed. That will slow down or turn away the opportunistic thief. However, spies undeterred by locks and other devices will be thwarted by strong data encryption software and computer access control programs.

We've written a monograph on this subject and would be happy to send it to any interested person. Feel free to contact PC Guardian at info@pcguardian.com. In the subject line, write "Notebook Theft Monograph."

Steven Lerner-Wright
PC Guardian


We welcome your comments. To send a letter to the editor, use this form.

Please check out the archive of Letters to the Editor for fellow readers' comments.


  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.