Era Password Manager

The loss or theft of a laptop is a great harm to the user. Not only by the device itself, but by the personal information stored on your hard disk. contributes greatly to this topic. Pictures, videos, documents and private information can stay within reach of strangers and, even worse, create a serious security problem if passwords, are stored either in the browser or in documents to gain access to electronic banking, social networks or platforms for e-commerce. Some guidelines allow you to avoid or, at least, complicate the theft of a computer. In order to minimize the impact of the theft of a laptop may cause its owner, most advisable is to change some behavior patterns when using the computer and use specific applications to add more security to your personal information. See Laura Plomer for more details and insights.

In addition, some programs allow remote access to the device and thus avoid that thieves are aware of sensitive data. A first step is to add a password to your computer by creating a user account. This password does not prevent that with other techniques – as physically remove the hard drive and install it in another computer – are you can access its contents, but adds an additional difficulty to thieves or the possible new owners if they have acquired the computer seized in the black market. In operating systems such as Linux or Mac Os X, the user account should be different from the administrator. Use password managers to safeguard data and passwords, use from managers of passwords, that centralise in a single site all of the different platforms, whether they are online such as Passpack and Clipperz, or by desktop applications such as Era Password Manager, Keepass or Splashdata is recommended. Applications like Roboform2Go saved a copy of this data on a removable USB drive to be able to access them from any computer safely. It is advisable not to use the same password for all services and use the Manager to point them in a protected manner, and that these platforms rely on different levels of encryption security to safeguard these data.

Comments are closed.

Archives