What is a BIOS Password?
BIOS level passwords are designed to be the first line of defense against unauthorized access to a system. If set, a user will be required to enter a password before a system has even begun entering Windows. While passwords at this level can provide excellent security benefits, it’s not as straight forward to reset as other passwords may be if they are forgotten.
How to Unlock
Depending on your systems model, unlocking can be performed through several different means. Many Dell Desktops and older notebook systems can have BIOS passwords reset by removing CMOS batteries and adjusting password jumpers (see Article ID: 600157 & Article ID: 52016 below) while modern notebooks and tablet systems will require you contact Dell Technical Support for a ‘Master password’ to be generated.
If contacting support for a master password you will be required to verify your ownership of the system before a password can be generated. Due to the value Dell places on our customers' privacy and security, Dell will not provide a BIOS or hard drive password unless ownership of the system has been properly verified. To make the process as simple as possible have as much of the following information available as possible before contacting support:
· First and Last Name on the Account
· Company Name (if applicable)
· Phone Number (including area code)
· Street Address, City, State and ZIP
· Email Address
If your system was purchased recently or the original account information does is not up to date with your details you can request Dell update the systems records by completing an ‘Ownership Transfer’ form. Details of the process and full instructions can be found at the following address: http://www.dell.com/support/retail/us/en/19/ownershiptransfer/IdentifySystem
Article ID: 600157
Article ID: 52016
What is Phishing?
Phishing is an act of fraudulently contacting multiple individuals or companies, in an attempt to obtain unauthorized access to sensitive / personal information. Phishing is a broad attack, using general information to elicit a response, not specifically targeting any one individual but using generalizations in the attempt claim validity to an information request. The request can seem trivial at the time but any information attained could be a used in the theft of a victims important information.
Spear Phishing is the targeting of a specific individual in the hopes to attain personal / restricted information. Similar to Phishing, but this time the attacker is more aware of the target, usually already knowing the name, address, email and phone number of the victim prior to the initial contact. A Spear Phishing target can be provided seemingly private information from a trustworthy source before information is requested, eventually leading to data theft.
Whaling is a term used for corporate level Phishing attempts. Taking the Spear Phishing approach to a higher level, Whaling targets are usually in upper level management or hold access to valuable restricted information. Much of the same means are used in Whaling attempts as Spear Phishing but the attacker will be very familiar with the target prior to making contact and communications will appear highly professional.
How to protect your self
NOTE: Suggestions for avoiding Phishing exploits are provided in an attempt to help ensure sensitive data isn't put at risk unnecessarily. It is not intended to be a comprehensive guide or address all possible exploit variations (ie, some social engineering exploits are performed in SMS text or in-person rather than email). Vigilance in safeguarding your sensitive data applies to all avenues of contact.
Get Support on Twitter @DellCaresPro
Dell Social Media | Webinar Series
Thanks to everyone that tuned in for this month’s technical support webinar. Don’t worry if you missed the live session though!
We’ve uploaded a recording of the webinar to our support page <Here> so you can share, and catch up.
You can also download the deck used in the presentation <Here>.
For all those who were able to join, we hope you found our presentation both enjoyable and informative. To learn more about our Technical Support Webinar series and sign up for future events at dell.com/webcast.
For additional BitLocker support find below a few of the most popular solutions we’ve identified.
In this quick 30 minute session we’ll take you through an introduction to BitLocker, along with some basic & advanced troubleshooting tips and tricks in answer to the questions we’ve identified as trending through social media, specifically regarding BitLocker key prompts.
Webinar | Archive
Want to learn more? You can find recordings of our previous Webinars below and at Dell.com/webcast.
Create & Use Dell Windows 10 Media
Here we discuss how to create bootable USB media for the installation of Windows 10 on your Dell computer, general operating system installation advice, and how to use command prompt for driver installation (pre-OS).
Ubuntu Basics & Installation
In this quick 40 minute session we’ll take you through the steps to complete an Ubuntu OS installation, while keeping your current Windows install and all your data intact. We’ll also be providing a brief introduction to Ubuntu and talking with Barton George who will be providing his insights into Dells Project Sputnik, Ubuntu collaboration.
Thunderbolt & TB16 Troubleshooting
In this webinar we take you through some of the intricacies relating to Thunderbolt technology, including technical specification overviews and comparisons, along with Docking/Adapter hardware solutions available from Dell that will help you best take advantage of the technology.
Have a topic that you’d be interested to see discussed?
Submit your suggestions to us @DellCaresPRO
Dell EMC | Social Media