Security

Make your data self-destruct with BackStopp

Your mission, if you choose to accept it, is to prevent would-be thieves from accessing your critical data. Find out how BackStopp can help.

If you keep up with the news, then you've surely read case after case about the loss of highly confidential or sensitive data. And not lost by a power failure or poor user judgment, mind you, but by theft. When working at the local coffee shop, airport, or even in the backseat of your car, your data is not safe when it's on mobile media.

Queue the Mission Impossible music!

Your mission, if you choose to accept it, is to prevent would-be thieves from accessing your critical data. Critical data encompasses a wide range — from bank records, social security numbers, and credit card numbers to usernames and passwords, saved session cookies for sites frequented by the CFO, and private e-mails. This data must not fall into the wrong hands, where attackers could leak it to the public or exploit it for financial gain.

You may think that data theft won't happen to you, but what about your coworkers, sales representatives, or other users of your network that holds customer private information? Can all these people keep the data they work with secure?

And don't think these risks are going away anytime soon. However, new tools have recently emerged that can potentially help protect your confidential data.

One such tool is BackStopp. This self-destructing solution ensures that a would-be thief can't recover your data.

BackStopp prides itself in its FBI-grade deletion of data that occurs before the operating system boots. The decommissioned files are part of a user-defined list, so you can specify which files BackStopp should remove if the laptop leaves its authorized zones.

BackStopp relies on several location-identifying technologies to track machines anywhere in the world, including GSM and RFID.

  • GSM: Using either an internal GSM card or external USB device, you can track if a laptop leaves a region or country. Even more important is that when the device is in a GSM network — a much broader area than Wi-Fi — it can receive the self-destruct command and begin decommissioning your data. This is obviously the best solution if you have the required hardware.
  • RFID: As long as the machine is near an RFID reader, the machine will continue as usual. Once it leaves this region, the machine will be decommissioned.

The leaking of private customer data can be extremely damaging to a company's reputation. Along with losing existing customers, you run the risk of losing future customers as well.

Editor's Picks