Photo of Robert Siciliano

Robert Siciliano

Professional Security Expert

Best Computer Security & Best Internet Privacy

Featured On:

  • TheTodayShow
  • CNN
  • MSNBC
Over the past few years criminal hackers have changed their motivation from seeking fun and fame to now seeking financial gain. As a result personal identifying information that can be turned into cash is the new currency of the criminal hacker. It is the responsibility of each person who stores this data to take the necessary steps to secure it. While there are numerous software programs and updates to your networks that need to be considered, this article will talk about the hardware available to begin the process.

For the best computer security, turn to our experts who have searched the Web for the best way to stop the hackers. Choose from the best Internet privacy to small business computer security options.

Best Computer Security by Robert Siciliano

The Best You Can Get

  • PC Tab Blast Alert

    Robert says: Noise is an effective deterrent that either draws attention or causes a thief to run. The PC TAB Blast Alert is a local alarm that attaches to your computer or other electronics. A local alarm (meaning it’s attached) is triggered if the PC Tab sticker is removed, or the connecting wire is cut. Once tripped, the siren sounds for over two hours, or until the key is inserted. There’s no motion trigger, so no false alarms.

    The Blast Alert alarm box can be attached directly to your equipment, forcing a thief to either carry a sounding alarm, or abandon the attempt. To secure multiple pieces of equipment, attach the alarm box to a stationary object and attach the PC Tab sensor to your computer. Additional PC Tab sensor packs can be purchased to secure multiple items in a daisy chain fashion.

    This thing is loud, obnoxious, and a certain deterrent.

    Protects:

    - LCD Projectors
    - Computers
    - Printers
    - Routers
    - Plasma displays
    - LCD panels
    - Burners
    - Hubs
    - Any other high-risk equipment!

  • Datamation Universal Desktop Security Cable Kit

    Robert says: The information on a computer is usually worth more than the PC itself. Because of this, you want to do everything possible to secure your desktop and all its components. This universal security cable kit includes large standard padlock available with keyed-alike, keyed-different, or master key options. Special cable traps capture and secure monitor, mouse, and keyboard cables. Universal CPU fasteners secure any computer and internal components. Flat panel monitor security fasteners included.

    • One 6-ft., 1/4-in. thick diameter galvanized steel aircraft cable, vinyl-coated to 5/16” total diameter
    • 40mm laminated-steel padlock with hardened steel double-locking shackle and locking washer
    • 1 glue-on hex-adapter feet and 2 hex-fasteners
    • 2 cable & housing traps
    • Industrial super-glue and prep kit
  • Kensington Notebook Lock

    Robert says: Laptops aren’t generally meant to be secured to a desk; their entire purpose is to be portable. However laptops are becoming less expensive and are replacing desktops. Deter thieves from stealing your notebook and the personal information on it. Patented T-bar locking mechanism and super-strong carbon tempered steel cable provide maximum protection that attaches to the standard Kensington security slot found in 99% of notebooks. Secure, protect and lock down your computer and leave it safe.

    Specifications:

    - Patented T-bar: Provides superior locking grip to security slot
    - Includes: 2 keys; rubber cable tie for cable management
    - Super-strong, steel composite cable with carbon tempered steel core
    - Built-in defense system guards against lock tampering
    - Patented T-bar lock provides superior lock strength in the security slot and theft protection

    • Easy to install & use for use in the office or when traveling
    • Sleek styling and design won’t block notebook ports or lift a notebook off the desk
    • Custom keying options available in a master access, shared access, or supervisor-only access
    • 6-ft., 4.5-mm thick carbon tempered steel cable
    • Locks into the standard Kensington security slot found in 99% of notebooks, and many flat panel monitors, desktops, projectors, printers, docking stations, tablet PCs, and other devices
  • 3M™ LCD Flat Screen Monitors and Laptop Privacy Computer Filters

    Robert says: These computer filters helps to keep information confidential anywhere you work! Whether sitting in your office, on a plane, in the airport, in class or out in public, you don’t want other people looking at your monitor while you work. Shoulder surfers can extract usernames and passwords along with proprietary data.

    Additional details:

    - Stays in place even when notebook computer is closed
    - Reversible - choose matte or gloss finish
    - One-year warranty

    • Keeps on-screen information private; from the side, others see a darkened screen, providing worry-free privacy
    • No blurring or distorting screen images
    • Helps protect your flat screen or laptop from scratches, fingerprints, and damage
    • Improves contrast and reduces screen reflections
    • Frameless design with easy-on, easy-off attachment
  • IronKey

    Robert says: This is the ultimate in portable data security. Whether simply storing data, or surfing securely, IronKey’s hardware-encrypted portable USB flash drives secure your most critical portable data. No one can access the data on your IronKey if it is ever lost or stolen.

    All data stored on an IronKey is encrypted with high-speed military-grade hardware encryption. Unlike software-based encryption, this “always-on” protection cannot be disabled and is protected against cold-boot and brute force attacks. No one can access files stored on an IronKey unless they authenticate with the correct password. All encryption and password verification is performed in hardware - and cannot be disabled by malware or a careless user.

    • Data is hardware-encrypted using AES CBC-mode encryption
    • Encryption keys are generated in hardware by a FIPS 140-2 compliant True Random Number Generator for maximum protection
    • Securely stores employee passwords
    • Can safely tunnel through insecure wireless networks
    • Does not require software, drivers, or administrator privileges

You will be happy with any of these

  • Cables Unlimited USB-2200 PC Lock

    Robert says: Information secure generally begins with “access control,” meaning, “who has access, how, and why?” This USB wireless PC lock is a quick solution for protecting your personal data and programs while you’re away from your PC, when going to the water cooler or taking a quick break. Each kit includes a USB receiver dongle, which is connected to the PC and a small access transmitter, which you carry. When you move more than two meters away from the PC, the wireless PC lock securely locks your PC until you return. It’s that easy. No passwords to remember and no keys to turn.

    Specifications:

    - Connector (1): USB A Male
    - Power: Bus/Bat.
    - USB: 1.0/1.1/2.0
    - Power: Bus.
    - Hot pluggable: Yes
    - OS support: Windows 98SE/ME/2000/XP
    - Windows 98SE/ME/2000/XP

    • Locks your PC when you walk away carrying the transmitter
    • No passwords to remember and no keys to turn
    • Unique security code
    • Battery included
    • USB 2.0/1.1/1.0 compatible
  • Microsoft Fingerprint Reader

    Robert says: As a convenience tool, you can log on to your computer and your favorite Web sites with the touch of your finger, without having to remember all those passwords — simply place your finger on the receiver whenever a password or username is required.

    Microsoft has developed a convenient solution for replacing all those passwords with something you don’t have to worry about forgetting: your fingerprint - just touch the fingerprint reader with a registered fingerprint whenever a password or user name is required, and you’re in. Just like that.

    Minimum System Requirements:

    Computer/Operating System:
    - Windows XP Home
    - Windows XP Professional
    - Tablet PC
    - Media Center Edition
    - With a Pentium 233 MHz or higher processor and 128 MB of RAM
    - Hard Disk Space 45 MB of available hard disk space
    - Connectivity: An available universal serial bus (USB) port
    - CD-ROM drive
    - Microsoft® Internet Explorer 6.0 or later and MSN® Explorer 8.0 and 9.0

    • Convenient password replacement
    • Access your favorite websites
    • Quickly switch users with a touch of a finger
    • Brand: Microsoft; interface: USB
    • Model: DG2-00002
  • The ThumbDrive TOUCH

    Robert says: As more people rely on computers and the Internet to create and store information, personal security and privacy becomes ever more important. ThumbDrive TOUCH combines biometric technologies to offer a single portable secure storage medium, offering protection against intrusion.

    Users who have difficulty remembering their passwords can now let their fingerprint do the remembering.

    It includes a fingerprint reader sensor that performs enrollment and verification of the user. Each time the user plugs in the ThumbDrive, a simple but accurate authentication process takes place - by placing the user’s finger on the sensor. Once the user is positively identified, the data that is stored on the ThumbDrive becomes accessible.

    Features:

    - Solid-state drive with no moving parts
    - Write protection by hardware write-protection switch
    - LED indicates the state of the drive
    - Compact, light, and low power consumption under both active and suspend modes
    - Mass storage compliant
    - No installation required

    Specifications:

    - Interface: USB Specification 1.1
    - Memory: 16MB/32MB/64MB/128MB

    • Biometric security prevents unauthorized access to data
    • Fingerprint enrollment and verification
    • Plug and Play via USB port
    • Easy to use and install
    • No external power supply required
  • KeyCarbon 1.5MB USB Corporate SE Keylogger

    Robert says: A keylogger monitors all your computer keystrokes. This stealthy USB keylogger works on USB keyboards for PC and MAC computers. The KeyCarbon USB keylogger records every keystroke typed on your computer (over 1 million keystrokes!) including e-mail, chat, IM, internet addresses and more. The KeyCarbon USB keylogger is the perfect solution for monitoring your employees’ and child’s computer and online activities.

    Simply unplug your keyboard and plug the KeyCarbon USB keylogger into the USB port. Then plug the keyboard into the KeyCarbon keylogger and it’s ready to record. There is no software to install! As keys are typed the data is stored inside the keylogger. When you want to see what’s been recorded simply open any word processor or text editor (Microsoft WordPad recommended) and type your password. The KeyCarbon hardware USB keylogger will display a menu allowing you to view what’s been recorded.

    Additional Features:

    - 128-bit Encryption
    - Records over 1.5 million keystrokes!
    - Works with any word processor/text editor

    • World’s only high & low speed USB key logger
    • Plug & Play key logger - no software to install!
    • Works on MAC computers & PCs with USB keyboards
    • CAN’T be detected by anti-virus or anti-spy software
    • Works on wireless keyboards

Related Articles

With the best computer security, you won't have to worry about hackers at home or your small business. We suggest the best Internet privacy and small business computer security options. Choose from security cables, notebook locks, privacy filters, fingerprint readers and other computer and Internet security to keep your data safe.