Absolute Software Helps Consumers Prevent Identity Theft During Tax Season and Beyond
Security Best Practices Combined with Laptop and Data Protection Software Help Keep Social Security Numbers & Tax Information Secure
Vancouver, Canada: April 13, 2011– Absolute® Software Corporation(“Absolute” or the “Company”) (TSX: ABT), the leading provider of endpoint security and management solutions that reduce IT costs, prove regulatory compliance, respond to computer theft, and optimize productivity, today announced best practices for consumers looking to protect and secure bank account information, identification numbers, and other sensitive data that is stored on their laptops, particularly during tax season.
“Tax season provides cyber-criminals with the perfect opportunity to gain access to the most valuable stolen goods on the market – personal data, including bank account information and social security numbers,” said Mark Grace, vice president of consumer business, Absolute Software. “Through our involvement in laptop theft investigations in 75 countries, we’ve seen countless cases where stolen information was used to open credit cards, withdraw money from bank accounts, or apply for loans. Given the type of information needed to file taxes online, there has never been a better time to make sure that the correct safety precautions are in place.”
With approximately 70 percent of individuals filing tax returns online in 2010 according to the IRS, Absolute recommends that consumers adopt the following security best practices to ensure that personal information stored on computers is protected well beyond this year’s April 18th tax filing deadline:
Protect against phishing attacks –Large companies like Target, Citi, and countless others impacted by the recent Epsilon breach have sent emails to consumers, notifying them of their official policies for collecting personal information. Government agencies have been impacted by phishing threats as well. To help educate consumers on the ways that it collects information from filers, the IRS lists current procedures on its website. Becoming familiar with these policies and being alert to suspicious emails is key to preventing the disclosure of personal and/or financial information to malicious sources.
Become a fan of document encryption –If confidential information or personal documentation is stored on a laptop, such as a PDF of a tax return, document encryption is an effective security measure. With many advanced tools available on the market today, consumers can easily protect, control access to, and track documents that are stored on or sent from computers.
Always use a secure Internet connection –Even after tax returns are processed, information related to returns is often stored on the device used to file the paperwork electronically. Taking that same device to an airport or local coffee shop and connecting to an open network creates an opportunity for an experienced hacker to easily gain access to sensitive data.
Run virus and/or malware scans often –Not all virus protection programs come with settings that allow for continuous scanning and threat removal. Ensuring that anti-virus software is up to date and system scans are done on a daily basis will help to identify and mitigate new threats that a system has been exposed to. It is also beneficial to complete these scans prior to online banking, shopping or bill-paying.
Know where devices are most vulnerable –Despite taking precautions to protect against hackers and other malicious sources online, the reality is that laptops (and the data stored on them) are still vulnerable to physical theft. Based on LoJack® for Laptops customer reports filed to the Absolute Theft Recovery Team,laptops are most likely to be stolenwhile at school or home, where they are used most frequently. Taking proper precautions to protect not only the devices themselves but the data as well is critical.
Security best practices combined with a complete software solution that offers remote device protection allows consumers to secure data from all angles. LoJack for Laptops by Absolute Software gives users the confidence that their laptops and information are protected should theft occur. LoJack for Laptops is a software-based theft recovery service that helps users remotely lock, delete, locate and recover stolen devices and the data contained within. With the technology in place, personal information remains protected even when it’s in the wrong hands, allowing users to avoid costly hardware replacements and the fear of identity theft.
For last-minute tax e-filers, Absolute is offering H&R Block at Home Basic Software for free* with the purchase of LoJack for Laptops Premium. Computer owners interested in taking advantage of this offer can do so by visitingwww.lojackforlaptops.com.
*Limited time offer. Promotion expires on April 15, 2011
How Computrace Technology Works
Computrace® and LoJack for Laptops are powered by the Absolute Software patented Computrace persistence technology. When embedded in the firmware of computers from leading computer manufacturers*, Computrace can survive operating system re-installations, as well as hard-drive reformats, replacements and re-imaging, helping to ensure that the service is there when you need it most. Whether a PC or Mac, the software is virtually undetectable and phones home to the Absolute Monitoring Center with location and asset information. If a computer is reported stolen, the Absolute Theft Recovery Team works on behalf of the customer to gather evidence from the computer to identify the thief’s location, and then works with local police to get the computer back. Customers can also remotely delete data to help keep it out of the hands of unauthorized users – a reliable contingency in case data protection solutions fail. Computrace or LoJack for Laptops can be easily activated by customers when they install a license ranging from 1-3 years.
Absolute empowers more than 12,000 customers worldwide to protect devices, data, applications, and users against theft or attack — both on and off the corporate network. With the industry’s only tamper-proof endpoint visibility and control solution, Absolute allows IT organizations to enforce asset management, security hygiene, and data compliance for today’s remote digital workforces. Absolute’s patented Persistence®technology is embedded in the firmware of Dell, HP, Lenovo, and 22 other leading manufacturers’ devices for vendor-agnostic coverage, tamper-proof resilience, and ease of deployment. See how it works atwww.absolute.comand follow us at@absolutecorp.
This press release contains forward-looking statements and financial outlook that involve risks and uncertainties. These forward-looking statements and financial outlook relate to, among other things, the expected performance, functionality and availability of the Company’s services and products, and other expectations, intentions and plans contained in this press release that are not historical facts. When used in this press release, the words “plan,” “expect,” “believe” and similar expressions generally identify forward-looking statements. These statements reflect the Company’s current expectations. They are subject to a number of risks and uncertainties, including, but not limited to, changes in technology and general market conditions. In light of the many risks and uncertainties, readers of the press release should understand that Absolute cannot assure them that the forward-looking statements and financial outlook contained in this press release will be realized. Furthermore, the forward-looking statements and financial outlook contained in this press release are made as of the date hereof and the Company does not undertake any obligation to update publicly or to revise any of the included forward-looking statements and financial outlook, whether as a result of new information, future events or otherwise, except as may be required by applicable securities laws.