Title: Laptop Security Measures
1Laptop Security Measures
- Cyber Security Month
- October 2006
2What are we going to talk about today?
- Keeping your laptop safe secure
- Traveling with a laptop
- Policies
- Resources
3Laptop Security, How to keep it safe and secure
- Register your personal computer or laptop with
the manufacturer - Will flag it if a thief ever sends it in for
maintenance - Increases your odds of getting it back
- Write down your laptops serial number and store
it in a safe place - Get a cable lock and use it!
- Over 80 of laptops on the market are equipped
with a Universal Security Slot (USS) - Allows laptop to be attached to a cable lock or
laptop alarm - Between 30-50 at office supply stores or online
- Tubular locks are preferable to the common
tumbler lock design - Tether laptop to a strong immovable and
unbreakable object
4Laptop Security, Keeping it safe secure cont
- Use tracking software to have your laptop call
home - Stealthy software solutions that enable your
laptop to check in to a tracking center
periodically using a traceable signal - If your laptop is lost or stolen, these agencies
work with the police, phone company, and internet
service providers to track and recover your
laptop - Most services are under 100
5Laptop Security, Keeping it safe secure cont
- Choose a secure operating system and lock it
down! - Windows 2000 Professional and Windows XP
Professional both offer secure logon, file
security, and the ability to encrypt data - If you are using Windows NT/2000/XP on your
laptop, use the NTFS file system to protect your
data from laptop thieves who may try to access
your data
6Laptop Security, Keeping it safe secure cont
- The Administrator Account
- Create a separate local account with
administrative rights (give it a complex
password) - Disable The Administrator Account (XP Pro and
2000 Pro) - Do not log onto your computer as an
administrator - Disabling the Administrator account will stop
some amateur hackers cold, and will annoy the
more determined ones - Backup Backup Backup!!
- Always backup your laptop before you do any
extended traveling that may put your data at risk
7Laptop Security, When traveling cont
- When traveling
- Never assume your laptop will be safe just
sitting around - Use a non descript carrying case
- Consider buying a form fitting padded sleeve for
your laptop - Carry it in a backpack, courier bag, briefcase,
or other common non descript carrying case - When flying, never check your laptop and never
leave your laptop unattended - If you keep you laptop in your hotel room, anchor
it securely to a metal post or fixed object
8Laptop Security, When traveling cont
- Make security a habit
- Get into the habit of locking your laptop up when
youre not working with it or when storing it - Use common sense when traveling
- Try to stay in physical contact with your laptop
at all times
9Laptop Security, Policies cont
- Policies
- View them at the http//cybersecurity.gonzaga.edu
website - Workstation Security
- Gonzaga University workstation users will use
workstations in a manner appropriate to the
sensitivity of the information contained on
university IT assets and will minimize the
possibility of unauthorized access to such
information - Only authorized personnel will access electronic
data, including the hardware and/or software on
which the data is stored. Users must
authenticate prior to use of resources - Confidential and sensitive data should be stored
on centralized server(s)
10Laptop Security, Policies cont
- User Responsibilities
- All users must log out or lock their computers
when they leave for the day - All computers should remain powered on in order
to facilitate patching and upgrading computers
with minimal impact to users - Auto lock screen savers will be utilized to lock
the workstation after no more than thirty (30)
minutes of inactivity - User access will be granted in accordance with
the Acceptable Use Policy
11Laptop Security, Policies cont
- User privileges on the workstation shall be
restricted to the minimum necessary level of
access for that user to perform their work, this
is the default configuration for all users - Locking workstations does not prevent data loss.
It is recommended that users save work frequently
and prior to leaving their workstation
12Laptop Security cont
- Mobile Computing
- Mobile computer users are responsible for backing
up data stored on the mobile computer on a
regular basis. Sensitive information must be
backed up after each use - Mobile computing data backups must not be stored
with the mobile device - Passwords and user identifications must not be
stored with the mobile device - When traveling, equipment (and media) should not
be left unattended in public places portable
computers should be carried as hand luggage - Loss of mobile computing equipment refer to the
Mobile Computing Policy ITS124 - Backing up data on mobile devices refer to the
Mobile Computing Policy ITS124
13Laptop Security cont
- Resources
- http//www.lojackforlaptops.com/learn-more-lojack-
for-laptops.asp - http//www.secure-it.com/shop/index.php/cPath/54
- http//www.xtool.com/p_computertracker.asp
- http//www.ztrace.com/zTraceGold.asp