Laptop Security Measures - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Laptop Security Measures

Description:

Windows 2000 Professional and Windows XP Professional both offer secure logon, ... If you are using Windows NT/2000/XP on your laptop, use the NTFS file system to ... – PowerPoint PPT presentation

Number of Views:328
Avg rating:3.0/5.0
Slides: 14
Provided by: black
Category:

less

Transcript and Presenter's Notes

Title: Laptop Security Measures


1
Laptop Security Measures
  • Cyber Security Month
  • October 2006

2
What are we going to talk about today?
  • Keeping your laptop safe secure
  • Traveling with a laptop
  • Policies
  • Resources

3
Laptop Security, How to keep it safe and secure
  • Register your personal computer or laptop with
    the manufacturer
  • Will flag it if a thief ever sends it in for
    maintenance
  • Increases your odds of getting it back
  • Write down your laptops serial number and store
    it in a safe place
  • Get a cable lock and use it!
  • Over 80 of laptops on the market are equipped
    with a Universal Security Slot (USS)
  • Allows laptop to be attached to a cable lock or
    laptop alarm
  • Between 30-50 at office supply stores or online
  • Tubular locks are preferable to the common
    tumbler lock design
  • Tether laptop to a strong immovable and
    unbreakable object

4
Laptop Security, Keeping it safe secure cont
  • Use tracking software to have your laptop call
    home
  • Stealthy software solutions that enable your
    laptop to check in to a tracking center
    periodically using a traceable signal
  • If your laptop is lost or stolen, these agencies
    work with the police, phone company, and internet
    service providers to track and recover your
    laptop
  • Most services are under 100

5
Laptop Security, Keeping it safe secure cont
  • Choose a secure operating system and lock it
    down!
  • Windows 2000 Professional and Windows XP
    Professional both offer secure logon, file
    security, and the ability to encrypt data
  • If you are using Windows NT/2000/XP on your
    laptop, use the NTFS file system to protect your
    data from laptop thieves who may try to access
    your data

6
Laptop Security, Keeping it safe secure cont
  • The Administrator Account
  • Create a separate local account with
    administrative rights (give it a complex
    password)
  • Disable The Administrator Account (XP Pro and
    2000 Pro)
  • Do not log onto your computer as an
    administrator
  • Disabling the Administrator account will stop
    some amateur hackers cold, and will annoy the
    more determined ones
  • Backup Backup Backup!!
  • Always backup your laptop before you do any
    extended traveling that may put your data at risk

7
Laptop Security, When traveling cont
  • When traveling
  • Never assume your laptop will be safe just
    sitting around
  • Use a non descript carrying case
  • Consider buying a form fitting padded sleeve for
    your laptop
  • Carry it in a backpack, courier bag, briefcase,
    or other common non descript carrying case
  • When flying, never check your laptop and never
    leave your laptop unattended
  • If you keep you laptop in your hotel room, anchor
    it securely to a metal post or fixed object

8
Laptop Security, When traveling cont
  • Make security a habit
  • Get into the habit of locking your laptop up when
    youre not working with it or when storing it
  • Use common sense when traveling
  • Try to stay in physical contact with your laptop
    at all times

9
Laptop Security, Policies cont
  • Policies
  • View them at the http//cybersecurity.gonzaga.edu
    website
  • Workstation Security
  • Gonzaga University workstation users will use
    workstations in a manner appropriate to the
    sensitivity of the information contained on
    university IT assets and will minimize the
    possibility of unauthorized access to such
    information
  • Only authorized personnel will access electronic
    data, including the hardware and/or software on
    which the data is stored. Users must
    authenticate prior to use of resources
  • Confidential and sensitive data should be stored
    on centralized server(s)

10
Laptop Security, Policies cont
  • User Responsibilities
  • All users must log out or lock their computers
    when they leave for the day
  • All computers should remain powered on in order
    to facilitate patching and upgrading computers
    with minimal impact to users
  • Auto lock screen savers will be utilized to lock
    the workstation after no more than thirty (30)
    minutes of inactivity
  • User access will be granted in accordance with
    the Acceptable Use Policy

11
Laptop Security, Policies cont
  • User privileges on the workstation shall be
    restricted to the minimum necessary level of
    access for that user to perform their work, this
    is the default configuration for all users
  • Locking workstations does not prevent data loss.
    It is recommended that users save work frequently
    and prior to leaving their workstation

12
Laptop Security cont
  • Mobile Computing
  • Mobile computer users are responsible for backing
    up data stored on the mobile computer on a
    regular basis. Sensitive information must be
    backed up after each use
  • Mobile computing data backups must not be stored
    with the mobile device
  • Passwords and user identifications must not be
    stored with the mobile device
  • When traveling, equipment (and media) should not
    be left unattended in public places portable
    computers should be carried as hand luggage
  • Loss of mobile computing equipment refer to the
    Mobile Computing Policy ITS124
  • Backing up data on mobile devices refer to the
    Mobile Computing Policy ITS124

13
Laptop Security cont
  • Resources
  • http//www.lojackforlaptops.com/learn-more-lojack-
    for-laptops.asp
  • http//www.secure-it.com/shop/index.php/cPath/54
  • http//www.xtool.com/p_computertracker.asp
  • http//www.ztrace.com/zTraceGold.asp
Write a Comment
User Comments (0)
About PowerShow.com