1 / 13

Laptop Security Measures

Laptop Security Measures. Cyber Security Month October 2006. What are we going to talk about today?. Keeping your laptop safe & secure Traveling with a laptop Policies Resources. Laptop Security, How to keep it safe and secure.

Download Presentation

Laptop Security Measures

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.


Presentation Transcript

  1. Laptop Security Measures Cyber Security Month October 2006

  2. What are we going to talk about today? • Keeping your laptop safe & secure • Traveling with a laptop • Policies • Resources

  3. Laptop Security, How to keep it safe and secure • Register your personal computer or laptop with the manufacturer • Will ‘flag’ it if a thief ever sends it in for maintenance • Increases your odds of getting it back • Write down your laptop’s serial number and store it in a safe place • Get a cable lock and use it! • Over 80% of laptops on the market are equipped with a Universal Security Slot (USS) • Allows laptop to be attached to a cable lock or laptop alarm • Between $30-$50 at office supply stores or online • Tubular locks are preferable to the common tumbler lock design • Tether laptop to a strong immovable and unbreakable object

  4. Laptop Security, Keeping it safe & secure con’t • Use tracking software to have your laptop call home • Stealthy software solutions that enable your laptop to check in to a tracking center periodically using a traceable signal • If your laptop is lost or stolen, these agencies work with the police, phone company, and internet service providers to track and recover your laptop • Most services are under $100

  5. Laptop Security, Keeping it safe & secure con’t • Choose a secure operating system and lock it down! • Windows 2000 Professional and Windows XP Professional both offer secure logon, file security, and the ability to encrypt data • If you are using Windows NT/2000/XP on your laptop, use the NTFS file system to protect your data from laptop thieves who may try to access your data

  6. Laptop Security, Keeping it safe & secure con’t • The Administrator Account • Create a separate local account with administrative rights (give it a complex password) • Disable The Administrator Account (XP Pro and 2000 Pro) • Do not log onto your computer as an ‘administrator’ • Disabling the Administrator account will stop some amateur hackers cold, and will annoy the more determined ones • Backup Backup Backup!! • Always backup your laptop before you do any extended traveling that may put your data at risk

  7. Laptop Security, When traveling con’t • When traveling… • Never assume your laptop will be safe just sitting around • Use a non descript carrying case • Consider buying a form fitting padded sleeve for your laptop • Carry it in a backpack, courier bag, briefcase, or other common non descript carrying case • When flying, never check your laptop and never leave your laptop unattended • If you keep you laptop in your hotel room, anchor it securely to a metal post or fixed object

  8. Laptop Security, When traveling con’t • Make security a habit • Get into the habit of locking your laptop up when you’re not working with it or when storing it • Use common sense when traveling • Try to stay in physical contact with your laptop at all times

  9. Laptop Security, Policies con’t • Policies • View them at the http://cybersecurity.gonzaga.edu website • Workstation Security • Gonzaga University workstation users will use workstations in a manner appropriate to the sensitivity of the information contained on university IT assets and will minimize the possibility of unauthorized access to such information • Only authorized personnel will access electronic data, including the hardware and/or software on which the data is stored. Users must authenticate prior to use of resources • Confidential and sensitive data should be stored on centralized server(s)

  10. Laptop Security, Policies con’t • User Responsibilities • All users must log out or lock their computers when they leave for the day • All computers should remain powered on in order to facilitate patching and upgrading computers with minimal impact to users • Auto lock screen savers will be utilized to lock the workstation after no more than thirty (30) minutes of inactivity • User access will be granted in accordance with the Acceptable Use Policy

  11. Laptop Security, Policies con’t • User privileges on the workstation shall be restricted to the minimum necessary level of access for that user to perform their work, this is the default configuration for all users • Locking workstations does not prevent data loss. It is recommended that users save work frequently and prior to leaving their workstation

  12. Laptop Security con’t • Mobile Computing • Mobile computer users are responsible for backing up data stored on the mobile computer on a regular basis. Sensitive information must be backed up after each use • Mobile computing data backups must not be stored with the mobile device • Passwords and user identifications must not be stored with the mobile device • When traveling, equipment (and media) should not be left unattended in public places; portable computers should be carried as hand luggage • Loss of mobile computing equipment – refer to the Mobile Computing Policy ITS124 • Backing up data on mobile devices – refer to the Mobile Computing Policy ITS124

  13. Laptop Security con’t • Resources • http://www.lojackforlaptops.com/learn-more-lojack-for-laptops.asp • http://www.secure-it.com/shop/index.php/cPath/54 • http://www.xtool.com/p_computertracker.asp • http://www.ztrace.com/zTraceGold.asp

More Related