You’d be hard pressed to find a business today that doesn’t have laptop computers listed among its assets. Large companies have hundreds of them; midsize ones issue them to managers to facilitate mobility; and many small businesses rely on them as primary computing devices.

Now, in and of itself, a laptop may seem harmless. But they literally hold a clear and present danger to companies: their batteries. Poorly maintained or damaged batteries can catch fire — putting any people and property nearby in serious risk. Faulty batteries can also hamper the device’s functionality, shorten its lifespan and put critical data at risk, inhibiting employees’ productivity and lowering morale.

Best practices

To help guard against the possibility that one of your company’s laptops might incur battery-related damage, follow these best practices:

  • Require the use of only compatible computer batteries or chargers.
  • If you maintain an inventory of loose batteries, keep them away from metal objects, such as small tools, coins, keys or jewelry.
  • Educate employees to, perhaps ironically, not use their computers on their laps or on any other soft surface (such as a bed or sofa) that could restrict airflow.
  • Teach employees to never place any heavy objects on their laptops that could crush, puncture or place a high degree of pressure on the battery.
  • Provide training on the proper transportation of laptops to prevent bumping the computers into objects or dropping them on hard surfaces.
  • Instruct users to never put a laptop in an area that could get very hot, such as the hood or dashboard of a vehicle, or a desk in a warm room directly exposed to sunlight.
  • Explain to employees how to safeguard their laptops from moisture and, if a computer does get wet, to bring it in for maintenance immediately because, even after drying, batteries or circuitry could slowly corrode and pose a safety hazard.

Ultimately, workers need to follow battery usage, storage and charging guidelines found in the user’s guide of their respective laptops.

Manufacturer info

Laptop battery manufacturers are a key resource in staying safe. Remind staff that they shouldn’t use batteries subject to recall while awaiting a replacement battery pack from the manufacturer. Employees should use the AC adapter power cord to power their laptops in the meantime.

If you’re unsure about the compatibility of any of your company’s laptops and batteries, or you suspect one of your units may have been damaged, contact the manufacturer to determine whether you’re at greater risk for a battery-related mishap. In fact, you might want to contact the manufacturer anyway just to get the latest on safety concerns about laptop batteries.

Critical assets

Laptops, and computing devices in general, represent a substantial cost outlay for virtually every size and type of business. We can help you set a reasonable purchasing budget and better track and manage the maintenance costs of these critical assets.

© 2019 Covenant CPA

Fraud experts have long known that “dark web” sites provide information, support and illicit goods to hackers and other criminals. But security company Terbium Labs recently published a report analyzing a treasure trove of fraud guides for sale on shady sites. These “educational” publications provide crooks with detailed instructions on exploiting security weaknesses to hack networks, obtain financial information and steal identities.

Effective tips

Although Terbium found that most of the guides it downloaded were relatively useless, there were still plenty that provided effective tips on compromising networks and disrupting antifraud procedures. The guides cover everything from account takeovers to phishing to counterfeit documents to stolen credit cards. Often, they discuss specific companies. For example, a “Bank Drop Creation Guide” provides detailed instructions on how to create a fraudulent bank account at nine specific financial institutions.

Some of the most dangerous information contained in these fraud guides tells would-be hackers how to use social engineering to breach companies’ security. Using the above example, a guide might contain a script crooks can follow to persuade a bank employee that a fraudulent account is legitimate.

Prized data

Terbium’s analysis of the guides found that certain types of personal information were particularly prized by thieves. Email addresses, which enable phishers to personalize their come-ons and track down a target’s full name and social media accounts, led this list. Passwords, not surprisingly, were a close second. User names, Social Security numbers and dates of birth were also highly sought after.

Among financial data, hackers prefer payment card information — though they show a clear preference for credit cards over debit cards. Card numbers are considered easy to obtain (millions of card numbers are available on the dark web), so the guides provide tips on maximizing profits before fraudulent purchases trigger alarms with the victim or card company.

What can you do?

Given the number of fraud perpetrators and wealth of information available to help them commit crimes, you may wonder how you can protect your personal financial or business’s customer data.

Individuals can reduce their risk by ignoring suspicious emails and disclosing financial information only on sites that provide SSL certificate authentication and encryption. Also, they should share even innocuous-seeming information, such as email addresses, only when necessary. Businesses need to work with experts to build a data security system that addresses their specific risks — and to update it religiously. Also, be sure to implement policies and procedures that prevent employees from inadvertently assisting fraud perpetrators. Contact us for help creating internal controls that will reduce your company’s fraud vulnerabilities at 205-345-9898 and info@covenantcpa.com.

© 2019 CovenantCPA