Steps to Protect Portable Devices

Written By Steps To Faculty Published May 11th, 2010

As much of the technology we uses has decreased in size, many people need to find ways to protect personal and sensitive data and information stored on these portable devices. These devices include, but are not limited to, notebooks, memory sticks, PDAs, and smart phones. Find out what can be done.

Step 1 Use strong passwords

Too often, hackers and other violators enter a system because the password was weak or easily detectible. The first line of defense against these attackers is to choose a strong alphanumeric password that is not used in your everyday activities. For example, if you select the password june261980, which happens to be your birthday, then anyone can try this as a password and get into your system, especially if they know when your birthday is. Cryptic and long passwords are better, such as Gt98567VcwQTRs. Some examples can be seen at

Step 2 Keep your data in various places

Keeping all of your important and sensitive data on one storage device is an easy trap to fall into given the bustle of the modern world. However, this is the last thing that you should do. Store your information in different storage locations. Use external devices for storing sensitive information such as a network area storage, which can be purchased at for $300.

Step 3 Encrypt

Although people may have physical access to your portable devices, encryption keeps them out of your data. The process of encryption ensures unwanted parties do not access your sensitive information. Encryption also guards against attackers from entering portable devices through password cracking and biometric manipulations.

Step 4 Install a firewall

Firewalls are key components for the protection of data in portable devices. Firewalls protect by “watching’ all inbound and outbound data transmissions and detects and blocks any intrusions.

Step 5 Keep current with security patches

Take any vendor notification of security updates and patch availability seriously and download any new patches that are required by these companies. Frequently update the proprietary operating systems on each device to ensure top notch security.

Remember, it’s better to be safe than sorry.

Roger Due

Investing in Your Destiny® & Coaching Program - Wealth Building Summit Dallas, Texas

My name is Roger Due and I am from Albuquerque, New Mexico and I am the owner of the Monsano software company. This has been an absolutely fantastic conference. This is the best I have ever been to.