Laptop physical security
-
Upload
kensington-clicksafe -
Category
Devices & Hardware
-
view
3.932 -
download
1
description
Transcript of Laptop physical security
![Page 1: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/1.jpg)
Laptop physical security
A scary but helpful guide for IT managers In the lifetime of every laptop there’s a 1 in 10
chance that it will get stolen.
![Page 2: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/2.jpg)
Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over
the lifetime of each computer
That’s 10% of your colleagues and co-workers knocking on your door for a replacement
machine
![Page 3: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/3.jpg)
This dismal scenario is extremely common. Around 90% of organisations are affected
![Page 4: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/4.jpg)
Laptop TheftQ. Has your organisation, or any of your
employees, experienced laptop theft or loss
![Page 5: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/5.jpg)
The top seven excuses your colleagues will use are:
1. We were burgled
![Page 6: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/6.jpg)
The top seven excuses your colleagues will use are:
2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
![Page 7: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/7.jpg)
The top seven excuses your colleagues will use are:
3. I was only away for a minute
![Page 8: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/8.jpg)
The top seven excuses your colleagues will use are:
4. I left it in the car
![Page 9: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/9.jpg)
The top seven excuses your colleagues will use are:
5. I thought it would be safe
![Page 10: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/10.jpg)
The top seven excuses your colleagues will use are:
6. I asked the person next to me to watch my stuff – he looked really trustworthy
![Page 11: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/11.jpg)
The top seven excuses your colleagues will use are:
7. It was on my desk – then it was gone
![Page 12: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/12.jpg)
Most theft is Opportunistic
Once reformatted, stolen laptops are difficult to spot
Most laptops - 58% - are stolen from work
Thieves usually steal laptops for their resale value rather than for the data
Laptops are easy to sell anonymously over the internet
![Page 13: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/13.jpg)
IDC research shows that the office is the most likely place for a thief to strike
![Page 14: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/14.jpg)
Where your laptops WILL BE stolen from:
![Page 15: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/15.jpg)
86% of IT security practitioners report that someone in their organization has had a laptop
lost or stolen
56% report that it resulted in a data breach
![Page 16: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/16.jpg)
59% of business managers surveyed agree that encryption stops cyber criminals from stealing
data on laptops versus 46% of IT security practitioners who strongly agree or agree
![Page 17: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/17.jpg)
65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the
key with other individuals
![Page 18: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/18.jpg)
50% of business managers have disengaged their laptop’s encryption solution
40% admit this is in violation of their company’s security policy
![Page 19: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/19.jpg)
52% of business managers sometimes or often leave their laptop with a stranger when travelling
![Page 20: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/20.jpg)
1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
![Page 21: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/21.jpg)
89% of companies experience laptop loss
![Page 22: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/22.jpg)
It takes average of 9 days to get fully operational after laptop loss
![Page 23: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/23.jpg)
The average total cost to a business from laptop loss is $47,000 (including downtime, support
& management time etc)
![Page 24: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/24.jpg)
Only 25% of laptops have data
encryption and 50% of business managers with
encryption switch it off
![Page 25: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/25.jpg)
Business problems you can avoid by using laptop locks
Loss of reputation
![Page 26: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/26.jpg)
Business problems you can avoid by using laptop locks
Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as
“sensitive”
![Page 27: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/27.jpg)
Business problems you can avoid by using laptop locks
Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as
“sensitive” Risk of being fined by your regulatory body
![Page 28: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/28.jpg)
Business problems you can avoid by using laptop locks Loss of reputation
Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as
“sensitive” Risk of being fined by your regulatory body
Risk of industrial espionage
![Page 29: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/29.jpg)
Business problems you can avoid by using laptop locks Loss of reputation
Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as
“sensitive” Risk of being fined by your regulatory body
Risk of industrial espionage Reduce the likelihood
of identity theft
![Page 30: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/30.jpg)
Business problems you can avoid by using laptop locks Loss of reputation
Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as
“sensitive” Risk of being fined by your regulatory body
Risk of industrial espionage Reduce the likelihood of identity theft
Losing customers
![Page 31: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/31.jpg)
Business problems you can avoid by using laptop locks
Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops
contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body
Risk of industrial espionage Reduce the likelihood of identity theft
Losing customers Having to tell your customer you lost their data because you
were careless
![Page 32: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/32.jpg)
Theft PreventionQ. What proportion of laptop theft do you believe would
not have occurred if a cable lock had been used?
![Page 33: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/33.jpg)
The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft
is $47,000 for larger organisations
– some of which can have over 1,000 laptops..
![Page 34: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/34.jpg)
IDC suggests that organisations typically underestimate the cost of laptop theft by over
30%
particularly the cost of downtime
![Page 35: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/35.jpg)
And remember you’ll only ever get
3%
of the lost or stolen laptops back
![Page 36: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/36.jpg)
7 common misconceptions
1. Encryption is the way forward
![Page 37: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/37.jpg)
1. Encryption is the way forward.
Company policies now routinely stipulate that any data leaving an office must be encrypted
Around 50% of executives turn off encryption on their laptops if they can
Encryption can never stop someone walking off with a laptop
![Page 38: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/38.jpg)
2. Better door security in the office is the answer
7 common misconceptions
![Page 39: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/39.jpg)
2. Better door security in the office is the answer Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
![Page 40: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/40.jpg)
7 common misconceptions
3. It won’t happen to me or my employees
![Page 41: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/41.jpg)
3. It won’t happen to me or my employees
A typical business laptop lasts for 3.1 years Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
![Page 42: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/42.jpg)
4. I can recover the data
7 common misconceptions
![Page 43: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/43.jpg)
4. I can recover the data.
On average it will take you nine days to replace a laptop – so you’ll certainly have time to try
35% of companies have never tried to successfully restore from their back up, so it might not work at all
![Page 44: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/44.jpg)
5. Cable locks are ugly and fiddly
7 common misconceptions
![Page 45: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/45.jpg)
5. Cable locks are ugly and fiddly...
Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
![Page 46: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/46.jpg)
6. Nobody like using laptop locks
7 common misconceptions
![Page 47: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/47.jpg)
6. Nobody like using laptop locks.
Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
![Page 48: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/48.jpg)
7. My employees simply won’t use laptop locks
7 common misconceptions
![Page 49: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/49.jpg)
7. My employees simply won’t use laptop locks.
They certainly will if you make the consequences of not using them serious enough
Introducing cultural change into any
organisation can take effort, but there’s a tipping point after which it becomes more natural to
embrace the change than to fight it
![Page 50: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/50.jpg)
How to prevent laptop theft
Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves
A laptop lock is the front line of defence
![Page 51: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/51.jpg)
How to prevent laptop theft
Add a clause to your HR or company policy to give people the right incentive to use a lock
![Page 52: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/52.jpg)
How to prevent laptop theft
Give colleagues brief training in theft awareness when you hand them out a lock
![Page 53: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/53.jpg)
How to prevent laptop theft
Ask employees not to leave their laptops in unattended cars
![Page 54: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/54.jpg)
How to prevent laptop theft
Insist and make it a disciplinary matter
– your business and reputation is certainlyworth it
![Page 55: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/55.jpg)
How to prevent laptop theft
Tell employees to use a lock when they are o At home
![Page 56: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/56.jpg)
How to prevent laptop theft
• Tell employees to use a lock when they are o At home o In a hotel
![Page 57: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/57.jpg)
How to prevent laptop theft
• Tell employees to use a lock when they are o At home o In a hotel o In the office
![Page 58: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/58.jpg)
How to prevent laptop theft
• Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop
![Page 59: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/59.jpg)
How to prevent laptop theft
• Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop o At a conference or training course
![Page 60: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/60.jpg)
What to do if your laptop does get stolen
• Think of a great excuse (because there is no justifiable reason)
![Page 61: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/61.jpg)
What to do if your laptop does get stolen
• Tell your boss and then take one step back and wait for the answer
![Page 62: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/62.jpg)
What to do if your laptop does get stolen
• Tell IT and then take one step back and wait for the answer
![Page 63: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/63.jpg)
What to do if your laptop does get stolen
• Tell your customers and then take one step back and wait for the answer
![Page 64: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/64.jpg)
What to do if your laptop does get stolen
• Tell your shareholders and then take one step back and wait for the answer
![Page 65: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/65.jpg)
What to do if your laptop does get stolen
• Report it to the police (you’ll be amongst others who made the same mistake)
![Page 66: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/66.jpg)
What to do if your laptop does get stolen
• For some of you – start looking for a new job
![Page 67: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/67.jpg)
What to do if your laptop does get stolen
• For some of you – change all your passwords
![Page 68: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/68.jpg)
What to do if your laptop does get stolen
• Ask friends for photos they may have as copies of the ones you just lost
![Page 69: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/69.jpg)
What to do if your laptop does get stolen
• Feign insanity
![Page 70: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/70.jpg)
What to do if your laptop does get stolen
• Beg IT to get you another one fast
![Page 71: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/71.jpg)
What to do if your laptop does get stolen
• Start rewriting the urgent report you just lost
![Page 72: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/72.jpg)
What to do if your laptop does get stolen
• Request an expense authorisation for a new laptop
![Page 73: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/73.jpg)
General
• Don't leave laptops unattended and always lock
![Page 74: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/74.jpg)
General
• Don't allow anyone else to use your laptop — it is company equipment and provides access
to our networks
![Page 75: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/75.jpg)
General
• If left at work overnight, lock out of sight
![Page 76: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/76.jpg)
General • Choose an ordinary looking briefcase or non-
traditional laptop carry bag• Bags that obviously contain computers are an
easily identifiable target for the casual thief
![Page 77: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/77.jpg)
At Home • Always store inside your home, never leave in
the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard
or strong drawer
![Page 78: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/78.jpg)
At Home • When it is not possible to lock away, use your
supplied T-bar lock attaching to either an immoveable object or to something that is
difficult or heavy to carry
![Page 79: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/79.jpg)
At Home • Do not allow any use that is not authorised by
The Company
![Page 80: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/80.jpg)
At Home • Only connect to approved or known wireless
networks• Ideally use your encrypted domestic
connection if available
![Page 81: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/81.jpg)
In the Car • Your laptop will be safer if it is not left in the car
at all
![Page 82: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/82.jpg)
In the Car • If absolutely necessary, lock out of sight in the
boot
![Page 83: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/83.jpg)
In the Car • If you expect to leave your laptop in the car
regularly, speak to the helpdesk and ask about additional security measures
• An in-car vault or separate lock to leave in your boot which can be locked to the spare wheel may be offered
![Page 84: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/84.jpg)
In the Car • Consider the overall security of the vehicle in
terms of the location, time of day and duration of your stay when parking
![Page 85: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/85.jpg)
In the Car • While the vehicle is in motion, your laptop
should be stored in its carry bag
• Ideally secure in the boot; a heavy item such as a laptop can become a hazard to vehicle occupants in an accident
![Page 86: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/86.jpg)
In the Car • Only connect to approved or known wireless
networks
![Page 87: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/87.jpg)
Public Transport and Public Places.
• Laptops are particularly vulnerable to theft and loss while using public transport
![Page 88: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/88.jpg)
Public Transport and Public Places.
• Do not use your laptop while travelling unless necessary
![Page 89: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/89.jpg)
Public Transport and Public Places.
• Never leave unattended and never allow anyone else to use your laptop
![Page 90: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/90.jpg)
Public Transport and Public Places.
• Be aware of your surroundings
• Ensure you are not exposing yourself or the laptop to theft
![Page 91: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/91.jpg)
Public Transport and Public Places. • Always use your T-bar cable lock, even when working, to
avoid the laptop being easily snatched
![Page 92: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/92.jpg)
Public Transport and Public Places.
• Only connect to approved or known wireless networks
![Page 93: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/93.jpg)
Hotels, Conference and Meeting Rooms
• Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
![Page 94: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/94.jpg)
Hotels, Conference and Meeting Rooms
• In conference and meeting rooms, use your T-bar lock
![Page 95: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/95.jpg)
Data Protection Responsibilities
• Always use encryption software approved and supplied by The Company
![Page 96: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/96.jpg)
Data Protection Responsibilities • Choose a password that
is unique to your data-encryption key; make it long, random and complicated to guess
![Page 97: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/97.jpg)
Data Protection Responsibilities
• Do not give your network password or token/access device to anyone
• YOU are responsible for all access under these codes
![Page 98: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/98.jpg)
Data Protection Responsibilities
• Remember that access to your laptop can also mean access to The Company's network
![Page 99: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/99.jpg)
Data Protection Responsibilities
• Your laptop is the property of The Company; do not lend it to anyone
![Page 100: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/100.jpg)
Data Protection Responsibilities
• If you leave your laptop switched on and unattended you must activate the password-protected screensaver
• Ideally, never leave switched on or logged in. Log out, shut down
![Page 101: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/101.jpg)
Malware Responsibilities
• Malware is harmful software such as viruses and spyware
• Malware on your laptop could be spread to the wider company network or risk the security of the data on your laptop
• No malware should be allowed on your computer
![Page 102: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/102.jpg)
Malware Responsibilities
• The Company provides all laptop users with pre-installed antivirus software
• Make sure you know how to access and use this software. Call the helpdesk for advice if needed
![Page 103: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/103.jpg)
Malware Responsibilities
• If you do not have regular access to The Company's network then you will not receive regular antivirus updates
• Make sure you log on to the company network at least once a week
![Page 104: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/104.jpg)
Malware Responsibilities
• Always scan files for viruses• Your email is automatically
scanned for you as are files from the company network
• If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
![Page 105: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/105.jpg)
Malware Responsibilities
• Do not open any email attachments unless they were expected and from a trusted source
• Email attachments are the number-one malware risk
![Page 106: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/106.jpg)
Malware Responsibilities
• Do not download any software. If you need a different or more current application, contact the helpdesk for advice
• Most permitted applications are updated automatically for you when you log into the company network
![Page 107: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/107.jpg)
Malware Responsibilities
• If you suspect a virus attack, contact the helpdesk immediately
• Do not access the company network or back up files until your laptop has been inspected
![Page 108: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/108.jpg)
1 in 10 business laptops gets stolen. The result can be catastrophic
Learn more about physical security now and get protected against theft!
Download the 16 page whitepaper
![Page 109: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/109.jpg)
Sources • *http://intel.ly/mkvRrl • **http://bit.ly/jN3RHl • http://clicksafe.kensington.com/laptop-physic
al-security-a-scary-but-helpful-guide-for-it-managers/
• http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
![Page 110: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/110.jpg)
Image credit• Slide 3 http://skincitysl.com/• Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html• Slide 6: http://triutami1359.blogspot.com/• Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/• Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/• Slide 9: http://themensgiftguide.com/blog/?p=355• Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/• Slide 11: http://www.hodson-office.co.uk/• Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/• Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html• Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/• Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/• Slide 19: http://www.singlesolution.com/blog/page/2/• Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html• Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6• Slide 22: http://www.justcalendar.org/calendar/calendar.jpg• Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/• Slide 24: http://www.pspsps.tv/2008/06/• Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php• Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/• Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/• Slide 28: http://uk.askmen.com/money/keywords/espionage.html• Slide 29: http://www.americanbadbusinesslist.com/identity-theft/• Slide 30: http://www.uktranslation.co.uk/• Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html• Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
![Page 111: Laptop physical security](https://reader034.fdocuments.net/reader034/viewer/2022050804/53f185758d7f72e94b8b4927/html5/thumbnails/111.jpg)
Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/Slide 42: http://www.recover-lost-data.co.uk/Slide 44: http://www.vibrant.com/cable-messes.phpSlide 48: http://inchatatime.blogspot.com/2007_11_01_archive.htmlSlide 52: http://speechempoweredcomputing.co.uk/Newsletter/Slide 53: http://news.bbc.co.uk/1/hi/8220274.stmSlides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.htmlSlides 81- 86: http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=KeywordsSlides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/Slides 101-107: http://www.malware-help.com/Slide 95- 100: http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx