top of page

Make sure that you have protected mode selected in Internet Explorer, so software can't be installed without your consent. In order for Protected Mode to be an option you have to go into in User Account Control settings (just type in UAC at Start) and confirm that it is not set to Never Notify.

Then in IE just go to Tools . . . Internet Options and select the Security tab.

Check off the 'Enable Protected Mode' box.


 
 

In Windows 7 if you to Start and type in 'Event Viewer', an application will launch that will allow you to track all login attempts to your PC.

In the Event Viewer menu list, select Windows Log and expand the folder tree. Select security. This will show you a log of events on your PC, and 'Date and Time' field will allow you to easily tell whenever someone has had your PC on.

Note that you may see entries with the Task Category of 'Logon' and with a note of 'An account was successfully logged on' on the General tab in the pane at the bottom, even when the someone has not successfully logged on and entered the correct password to access the system.

If you click on the 'System' icon in the tree, and scroll to find 'Error' level records, you'll be able to find notes reading, "currently configured password due to the following error: Logon failure: unknown user name or bad password." on the general tab. A good way to pinpoint when an unauthorized person was trying to access your PC.


 
 

You can use VeraCrypt to encrypt your hard drive. Go to the System menu and select, Encrypt System Partition / Hard Drive.

If you choose the Normal method of encryption, you'll be given the option to either encrypt the entire partition on which the Windows OS is running, or the complete hard drive. Users of a laptop notebook may have a special recovery partition that will lead an encrypted hard drive to become unbootable, so it may be wise to use the former option. VeraCrypt will allow you to account for a situation where you have more than one operating system installed.

You can select between nine different algorithms to encrypt the data.

At the next stage you'll be prompted to enter a password which must be between 20 and 64 characters. If you select the option for key files, you'll have to provide certain key files on a USB drive. The option for a PIM - Personal Iterations Multiplier - will require that you enter a number, which will later have to be given with a password when you boot up the computer.

At the next stage you move your mouse randomly in order to increase the strength of the encryption keys.

As part of the process you're required to create a recovery disk on an optical disk. If the bootloader gets damaged you can use this to get into your encrypted drive.

VeraCrypt also gives you the option to wipe unencrypted data on your drive.

When you reboot your computer, you'll have to enter the password to unencrypt the drive before your regular Windows login. Note that you'll be prompted to enter a PIM even if you haven't set one. Just press enter if you did not select this option.


 
 

Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page