Security - Blog - Security - Dell Community

Security - Blog


Enhance security and reduce risks with tips from experts and peers.
  • Dell Technical Support | BitLocker Webinar

    Dell Social Media | Webinar Series  


    Thanks to everyone that tuned in for this month’s technical support webinar. Don’t worry if you missed the live session though!


    We’ve uploaded a recording of the webinar to our support page <Here> so you can share, and catch up.


    You can also download the deck used in the presentation <Here>.


    For all those who were able to join, we hope you found our presentation both enjoyable and informative. To learn more about our Technical Support Webinar series and sign up for future events at  


    For additional BitLocker support find below a few of the most popular solutions we’ve identified. 


     In this quick 30 minute session we’ll take you through an introduction to BitLocker, along with some basic & advanced troubleshooting tips and tricks in answer to the questions we’ve identified as trending through social media, specifically regarding BitLocker key prompts.

     Webinar | Archive

    Want to learn more? You can find recordings of our previous Webinars below and at

    Create & Use Dell Windows 10 Media

    Here we discuss how to create bootable USB media for the installation of Windows 10 on your Dell computer, general operating system installation advice, and how to use command prompt for driver installation (pre-OS).

    Ubuntu Basics & Installation

    In this quick 40 minute session we’ll take you through the steps to complete an Ubuntu OS installation, while keeping your current Windows install and all your data intact. We’ll also be providing a brief introduction to Ubuntu and talking with Barton George who will be providing his insights into Dells Project Sputnik, Ubuntu collaboration.

    Thunderbolt & TB16 Troubleshooting

    In this webinar we take you through some of the intricacies relating to Thunderbolt technology, including technical specification overviews and comparisons, along with Docking/Adapter hardware solutions available from Dell that will help you best take advantage of the technology.



    Have a topic that you’d be interested to see discussed?

    Submit your suggestions to us @DellCaresPRO

    Dell-Shawn B

    Dell EMC | Social Media

  • Clearing Notebook & Desktop BIOS Passwords


    What is a BIOS Password?

    BIOS level passwords are designed to be the first line of defense against unauthorized access to a system. If set, a user will be required to enter a password before a system has even begun entering Windows. While passwords at this level can provide excellent security benefits, it’s not as straight forward to reset as other passwords may be if they are forgotten.


    How to Unlock

    Depending on your systems model, unlocking can be performed through several different means. Many Dell Desktops and older notebook systems can have BIOS passwords reset by removing CMOS batteries and adjusting password jumpers (see Article ID: 600157 & Article ID: 52016 below) while modern notebooks and tablet systems will require you contact Dell Technical Support for a ‘Master password’ to be generated.

    If contacting support for a master password you will be required to verify your ownership of the system before a password can be generated. Due to the value Dell places on our customers' privacy and security, Dell will not provide a BIOS or hard drive password unless ownership of the system has been properly verified. To make the process as simple as possible have as much of the following information available as possible before contacting support:

    ·         First and Last Name on the Account

    ·         Company Name (if applicable)

    ·         Phone Number (including area code)

    ·         Street Address, City, State and ZIP

    ·         Email Address


    Transferring Ownership

    If your system was purchased recently or the original account information does is not up to date with your details you can request Dell update the systems records by completing an ‘Ownership Transfer’ form. Details of the process and full instructions can be found at the following address:   


    Desktop BIOS / Jumper resets

    Article ID: 600157 

    <ADMIN NOTE: Broken link has been removed from this post by Dell>


    How to use the jumper to reset the BIOS password on your Dell laptop (Built before 2004)

    Article ID: 52016

  • Social Engineering – Recognizing Phishing / Whaling attempts


    What is Phishing?

    Phishing is an act of fraudulently contacting multiple individuals or companies, in an attempt to obtain unauthorized access to sensitive / personal information. Phishing is a broad attack, using general information to elicit a response, not specifically targeting any one individual but using generalizations in the attempt claim validity to an information request. The request can seem trivial at the time but any information attained could be a used in the theft of a victims important information.  


    Spear Phishing?

    Spear Phishing is the targeting of a specific individual in the hopes to attain personal / restricted information. Similar to Phishing, but this time the attacker is more aware of the target, usually already knowing the name, address, email and phone number of the victim prior to the initial contact. A Spear Phishing target can be provided seemingly private information from a trustworthy source before information is requested, eventually leading to data theft.  



    Whaling is a term used for corporate level Phishing attempts. Taking the Spear Phishing approach to a higher level, Whaling targets are usually in upper level management or hold access to valuable restricted information. Much of the same means are used in Whaling attempts as Spear Phishing but the attacker will be very familiar with the target prior to making contact and communications will appear highly professional.


    How to protect your self

    • Don’t respond to an e-mails that request personal and financial information. Contact the company directly if you are suspicious of an e-mail.
    • Visit Web sites directly through the URL bar, not links in email
    • Keep a regular check on your accounts and don’t recycle passwords.
    • Make sure any web site requesting personal information is secure. https should be at the beginning of the Web site address where you enter personal information. The "s" stands for secure. If you don't see https, it is not a secure, and you should not enter personal information.
    • Help keep your computer secure by using up-to-date security and anti-virus software.
    • Don't enter personal or financial information into pop-up windows since they are not always secure.
    • Keep your Microsoft® Windows® software up to date with automatic Windows Update.
    • Don't open unexpected file attachments received in e-mail. Like fake links, attachments are often used in fraudulent e-mails and can be dangerous. Opening an attachment in a phishing e-mail could cause you to download spyware or a virus.
    • If in doubt always request and check the credentials of the person / company that is contacting you. Again contact the company directly I you have concerns. 

    NOTE: Suggestions for avoiding Phishing exploits are provided in an attempt to help ensure sensitive data isn't put at risk unnecessarily. It is not intended to be a comprehensive guide or address all possible exploit variations (ie, some social engineering exploits are performed in SMS text or in-person rather than email). Vigilance in safeguarding your sensitive data applies to all avenues of contact.