180 likes | 894 Views
Laptop Security Measures. Cyber Security Month October 2006. What are we going to talk about today?. Keeping your laptop safe & secure Traveling with a laptop Policies Resources. Laptop Security, How to keep it safe and secure.
E N D
Laptop Security Measures Cyber Security Month October 2006
What are we going to talk about today? • Keeping your laptop safe & secure • Traveling with a laptop • Policies • Resources
Laptop Security, How to keep it safe and secure • Register your personal computer or laptop with the manufacturer • Will ‘flag’ it if a thief ever sends it in for maintenance • Increases your odds of getting it back • Write down your laptop’s serial number and store it in a safe place • Get a cable lock and use it! • Over 80% of laptops on the market are equipped with a Universal Security Slot (USS) • Allows laptop to be attached to a cable lock or laptop alarm • Between $30-$50 at office supply stores or online • Tubular locks are preferable to the common tumbler lock design • Tether laptop to a strong immovable and unbreakable object
Laptop Security, Keeping it safe & secure con’t • Use tracking software to have your laptop call home • Stealthy software solutions that enable your laptop to check in to a tracking center periodically using a traceable signal • If your laptop is lost or stolen, these agencies work with the police, phone company, and internet service providers to track and recover your laptop • Most services are under $100
Laptop Security, Keeping it safe & secure con’t • Choose a secure operating system and lock it down! • Windows 2000 Professional and Windows XP Professional both offer secure logon, file security, and the ability to encrypt data • If you are using Windows NT/2000/XP on your laptop, use the NTFS file system to protect your data from laptop thieves who may try to access your data
Laptop Security, Keeping it safe & secure con’t • The Administrator Account • Create a separate local account with administrative rights (give it a complex password) • Disable The Administrator Account (XP Pro and 2000 Pro) • Do not log onto your computer as an ‘administrator’ • Disabling the Administrator account will stop some amateur hackers cold, and will annoy the more determined ones • Backup Backup Backup!! • Always backup your laptop before you do any extended traveling that may put your data at risk
Laptop Security, When traveling con’t • When traveling… • Never assume your laptop will be safe just sitting around • Use a non descript carrying case • Consider buying a form fitting padded sleeve for your laptop • Carry it in a backpack, courier bag, briefcase, or other common non descript carrying case • When flying, never check your laptop and never leave your laptop unattended • If you keep you laptop in your hotel room, anchor it securely to a metal post or fixed object
Laptop Security, When traveling con’t • Make security a habit • Get into the habit of locking your laptop up when you’re not working with it or when storing it • Use common sense when traveling • Try to stay in physical contact with your laptop at all times
Laptop Security, Policies con’t • Policies • View them at the http://cybersecurity.gonzaga.edu website • Workstation Security • Gonzaga University workstation users will use workstations in a manner appropriate to the sensitivity of the information contained on university IT assets and will minimize the possibility of unauthorized access to such information • Only authorized personnel will access electronic data, including the hardware and/or software on which the data is stored. Users must authenticate prior to use of resources • Confidential and sensitive data should be stored on centralized server(s)
Laptop Security, Policies con’t • User Responsibilities • All users must log out or lock their computers when they leave for the day • All computers should remain powered on in order to facilitate patching and upgrading computers with minimal impact to users • Auto lock screen savers will be utilized to lock the workstation after no more than thirty (30) minutes of inactivity • User access will be granted in accordance with the Acceptable Use Policy
Laptop Security, Policies con’t • User privileges on the workstation shall be restricted to the minimum necessary level of access for that user to perform their work, this is the default configuration for all users • Locking workstations does not prevent data loss. It is recommended that users save work frequently and prior to leaving their workstation
Laptop Security con’t • Mobile Computing • Mobile computer users are responsible for backing up data stored on the mobile computer on a regular basis. Sensitive information must be backed up after each use • Mobile computing data backups must not be stored with the mobile device • Passwords and user identifications must not be stored with the mobile device • When traveling, equipment (and media) should not be left unattended in public places; portable computers should be carried as hand luggage • Loss of mobile computing equipment – refer to the Mobile Computing Policy ITS124 • Backing up data on mobile devices – refer to the Mobile Computing Policy ITS124
Laptop Security con’t • Resources • http://www.lojackforlaptops.com/learn-more-lojack-for-laptops.asp • http://www.secure-it.com/shop/index.php/cPath/54 • http://www.xtool.com/p_computertracker.asp • http://www.ztrace.com/zTraceGold.asp