I often talk about computer failures of various sorts and what you should be prepared for: the crash that happens just before you save your document to disk, the failure that renders a disk completely unreadable and unrecoverable, or the computer that dies the true death taking all of your data with it.
You know the drill. Hopefully by now, you’re prepared for that.
But by being prepared for that, you’re actually only ready for one half of a somewhat-related disaster.
What happens when your computer … disappears?
Become a Patron of Ask Leo! and go ad-free!
It’s about more than travel
Typically, what we think of in a scenario like this is the traveler who’s lost his laptop. Perhaps he left it at the security checkpoint1. Or maybe it was stolen out of a hotel room. Or possibly something else happened. The bottom line is that it’s gone.
But that same scenario can play out elsewhere with the same result. Electronics are a popular item for theft and burglary at home and at work. Perhaps you take your portable computer to school or a local coffee house from time to time where it can also be stolen or left behind.
Regardless of the specifics, just about any computer can disappear. Certainly, the portable ones can as well as the desktops.
The loss of the data on the computer is perhaps the most easily dealt with.
One of the other ways that your computer can “disappear” is that it can simply fail catastrophically. The device may physically still be present, but as it’s no longer functional, that doesn’t help. Everything that was on it is gone. No, not all failures are this disastrous and this one isn’t that likely, but it can still happen – and thus, you must be prepared.
That’s what backups are for.
And by being prepared with a recent backup, you’re also prepared for the loss of your computer by other means.
Replace the computer, grab your data from your backup, and life goes on.
What most people don’t plan on is the theft of the data that’s on their lost or stolen computer.
Be it the thief or the person he sells your hardware to, eventually your computer could come into the hands of someone who might know what they’re doing. Someone who might start poking around and discovering your data.2 Depending on how you use your computer and what you have stored on it, that could be a big deal.
This is where encryption comes in. If you have sensitive personal data on your computer, and especially if that’s on a portable computer of some sort, I would consider using an encryption tool such as VeraCrypt.
VeraCrypt can be used to either:
- Create virtual encrypted drives; files that are “mounted” to appear as additional drives after you specify the proper passphrase.
- Perform whole-disk encryption, requiring that you specify the proper passphrase as part of the boot process to unlock the entire contents of the hard drive.
I recommend that you do not rely on password protection in applications, such as Word or Excel, or tools, such as WinZip. While they have improved in recent years, I still believe that they remain ultimately only useful to keep honest people honest. If an intruder is determined, they’re often easily cracked with information found on the internet.
Whether you encrypt your entire drive (which has the benefit of encrypting the paging file, temporary files, and everything else), or just a large volume, it depends on a combination of your paranoia, how you use your computer, and how important the data is that might be stored. Security conscious businesses and government agencies will rely on whole-drive encryption.
Depending on how you have your computer configured and how you use it, it’s often possible to extract from it such things as the passwords “remembered” for you by your browser. If your computer is stolen while it’s on or in standby or hibernation, it’s also conceivable that you might leave it signed in to various online accounts. The thief could quite possibly change your password and steal your account without even needing the password.
This is where two-factor authentication comes into play.
If you have two-factor authentication properly enabled and configured, a thief can’t login to your account even if he has the password. That’s why I have it enabled on all my accounts that support it.
Two-factor authentication is becoming increasingly popular as more account hacks happen. Google is one of the earliest and most complete adopters, and other services are following suit. Check with your online service providers – email, online storage, etc. – to see if two-factor (also called multi-factor) authentication is available.
In recent years, mobile devices have exploded. It seems like everyone is carrying at least one, if not more than one. Checking email, uploading photos, using social media – mobile is almost everywhere.
And naturally, mobile devices are being lost and stolen.
Mobile devices are a tad harder to secure. The single most important thing that you can do for a mobile device that you carry with you regularly is to lock it with a pin code (or in some cases, a swipe pattern). Yes, you’ll need to tap out that code each time you wake up your phone, but that’s a small inconvenience compared to having a thief have quick and easy access to the treasure trove of personal data that many people keep with them.
In addition, both Apple (via iCloud‘s Find My iPhone) and Android (through Google’s Android Device Manager) support locating and remote wiping of lost mobile devices, if set up before hand. There are also several apps that will instruct a mobile device to wipe or self-destruct on receipt of a specially formatted text message.
Theft & loss
The risks of losing a computer or mobile device are easy to overlook. Inconvenience and data loss are the first to come to mind, but understanding that your data could end up in the hands of a complete stranger is well worth considering.
And it’s worth preparing for it.
This is actually an expanded update to a podcast I recorded back in 2005.
Download the mp3 (3M)