Dell Service Erases Data from Lost Laptops

A Dell-commissioned study released yesterday shows that 12,000 laptop computers are lost in airports each week. That’s a staggering number when you consider the potential cost of lost and misused corporate data. A look back at so many headlines from the U.S. Department of Veterans Affairs to Boeing, shows that the cost can go far […]

Written By: Jessica Davis
Jul 1, 2008
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A Dell-commissioned study released yesterday shows that 12,000 laptop computers are lost in airports each week. That’s a staggering number when you consider the potential cost of lost and misused corporate data. A look back at so many headlines from the U.S. Department of Veterans Affairs to Boeing, shows that the cost can go far beyond that of the simple IT asset. The bad press alone can tarnish any company’s reputation as well.

The study’s author points out that people who lose their laptops at airports don’t even spend much time trying to get them back. Airports can have many, many different lost-and-found departments, and losing any kind of luggage at an airport is sometimes akin to shooting it into space. You are not going to get it back. (I speak from experience—having lost a bag of my most precious treasures and that year’s W2s—complete with all my family’s social security numbers when I moved across the country last year). I was traveling with multiple pets, a 20-month-old toddler, two laptops and other encumbrances that made me less focused on the bag. Yes, I was THAT passenger that day. My apologies if you were on the same flight. I almost went out the back door myself. And, the airline never found the bag and didn’t seem to try very hard either.

Dell has introduced a “poison pill” type technology to counter the risk of data loss associated with a missing notebook computer. If the laptop that has been reported lost connects to the Internet ever again, it will trigger a mechanism to delete all the data designated by the user as sensitive.

Of course, you probably want to make sure that you don’t leave your “poison pill” password lying around anywhere where it might be seen by a revenge-minded ex-spouse, spurned stalker, rejected job applicant, fired direct report or someone else you may have annoyed.

For those VARs looking to provide customers with a similar level of security for very little money, consider this: Leave the sensitive data back at the office, and make it a policy that such data never resides on laptops. When it comes to sensitive data, make sure laptops only ever act as a thin client. That’s the lesson I learned from my lost bag—don’t pack what you aren’t willing to lose. Cheap solution; solid protection.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance

Sherweb launches CyberMSP Community, offering MSPs tools, guidance, and scalable programs to deliver customized, real-time cybersecurity.

Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs

Arctic Wolf’s 2025 outlook shows MSP opportunities as insurers tackle ransomware threats and emerging AI risks through expanded security partnerships.

Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA

MetTel secures a $54M contract to modernize 15,000 VA phone lines across 1,875 locations using its POTS Transformation solution, enhancing reliability and performance.

Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.