This is the first part of the Protecting “Your Digital Assets” series of articles. Today we are focusing on the simplest and most overlooked part of computer security, the physical security of the device itself. If your computer or smartphone is stolen, well, it can be game over for your personal information.
Back when I was in computer school, we were admonished to “start at the physical level” when troubleshooting a computer problem. You know – is it plugged in, is it turned on? This is important advice when it comes to computer security, too. Your computers need to be physically secured from simple theft by an outsider or even a disgruntled employee. This means your server is in a dedicated closet or room, not out in the open office area, and there is a lock on the door. If you have security cameras, one should be pointed at the server location.
Desktop PCs can be physically secured with simple cable and lock kits. You should be using a user name and password to log in to your computer so that someone cannot just sit down, turn it on, and have unfettered access to your computer files.
Laptops, tablets, and smartphones need to be secured when mobile. Leaving your laptop visible on the backseat of your locked car is not secure; put it in the trunk if you can’t take it with you. Using something like LoJack for Laptops or Prey is advised.
Leaving your phone out on a table or bar top is an open invitation to a snatch and grab artist. And ladies, the purse can be an easy place to lose your smartphone, too. An interior zipper pocket can be your best solution, rather than carrying it on the outside pocket that was designed for it. A software tracking and/or device wiping program is a particularly great addition to any mobile computing device, so you can find and recover your device, or delete your personal information and files remotely if your computer or smartphone becomes lost or is stolen.
And then there are the ubiquitous flash drives and external backup drives. Here you need to keep your wits about you and don’t leave these little gems out in the open for anyone to snatch. There are flash drives that come with password protection and encryption, and if your data is important, you should be using this type of media for storage.
So this is the first step in the process of creating a strong security profile for your business or personal information. Please stay tuned for Part Two – Internet Security.Share