US-CERT Cyber Security Tip ST04-017 -- Protecting Portable Devices: Physical Security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                         Cyber Security Tip ST04-017
               Protecting Portable Devices: Physical Security

   Many computer users, especially those who travel for business, rely on
   laptops and PDAs because they are small and easily transported. But while
   these characteristics make them popular and convenient, they also make them
   an ideal target for thieves. Make sure to secure your portable devices to
   protect both the machine and the information it contains.

What is at risk?

   Only you can determine what is actually at risk. If a thief steals your
   laptop or PDA, the most obvious loss is the machine itself. However, if the
   thief is able to access the information on the computer or PDA, all of the
   information stored on the device is at risk, as well as any additional
   information that could be accessed as a result of the data stored on the
   device itself.

   Sensitive corporate information or customer account information should not
   be accessed by unauthorized people. You've probably heard news stories about
   organizations panicking because laptops with confidential information on
   them  have  been lost or stolen. But even if there isn't any sensitive
   corporate information on your laptop or PDA, think of the other information
   at risk: information about appointments, passwords, email addresses and
   other contact information, personal information for online accounts, etc.

How can you protect your laptop or PDA?

     * Password-protect your computer - Make sure that you have to enter a
       password to log in to your computer or PDA (see Choosing and Protecting
       Passwords for more information).
     * Keep your laptop or PDA with you at all times - When traveling, keep
       your laptop with you. Meal times are optimum times for thieves to check
       hotel rooms for unattended laptops. If you are attending a conference or
       trade  show, be especially waryâ??these venues offer thieves a wider
       selection of devices that are likely to contain sensitive information,
       and the conference sessions offer more opportunities for thieves to
       access guest rooms.
     * Downplay your laptop or PDA - There is no need to advertise to thieves
       that you have a laptop or PDA. Avoid using your portable device in
       public  areas, and consider non-traditional bags for carrying your
       laptop.
     * Be aware of your surroundings - If you do use your laptop or PDA in a
       public area, pay attention to people around you. Take precautions to
       shield yourself from "shoulder surfers"â??make sure that no one can see
       you type your passwords or see any sensitive information on your screen.
     * Consider an alarm or lock - Many companies sell alarms or locks that you
       can use to protect or secure your laptop. If you travel often or will be
       in a heavily populated area, you may want to consider investing in an
       alarm for your laptop bag or a lock to secure your laptop to a piece of
       furniture.
     * Back up your files - If your portable device is stolen, it's bad enough
       that someone else may be able to access your information. To avoid
       losing all of the information, make backups of important information and
       store the backups in a separate location (see Good Security Habits for
       more  information).  Not only will you still be able to access the
       information, but you'll be able to identify and report exactly what
       information is at risk.

What can you do if your laptop or PDA is lost or stolen?

   Report the loss or theft to the appropriate authorities. These parties may
   include representatives from law enforcement agencies, as well as hotel or
   conference staff. If your device contained sensitive corporate or customer
   account  information,  immediately  report  the  loss or theft to your
   organization so that they can act quickly.
     _________________________________________________________________

     Author: Mindi McDowell
     _________________________________________________________________

     Produced 2004 by US-CERT, a government organization.

     Note: This tip was previously published and is being
     re-distributed to increase awareness.

     Terms of use

     http://www.us-cert.gov/legal.html

     This document can also be found at

     http://www.us-cert.gov/cas/tips/ST04-017.html

     For instructions on subscribing to or unsubscribing from this
     mailing list, visit http://www.us-cert.gov/cas/signup.html.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSxgfZNucaIvSvh1ZAQIrtwf/bcFJd/Nk/TDKyuo5e50sEIwhnWji1a9x
Uxf6c+aWxHBpw9yjljIIHRF2IKsahoF6Lu7DsPjTUj/L2z9AVLMOb9e6qkAc0/sG
dZ7bKG6oSBSbRCb6JfEvMQHNnX+R+OHCcyw+J/kgDV1aP8jEAK+wDSXbe66elw/k
tF0uK/oGgrQ/d/mCvV0M2FejTZUpU6VetBI+HL7p81tsnQHCi5vJTyeSgvT7uOVd
0PS6nOGwZB/SsVsCvZNtEz00rh1Efgy3eqL4wsrSDK9U7dj5tjCR3G7F2E0qi7G9
iG9Yr6MYlwgRnyM/idMzyvCmXKz6tSolugLJ3Ep2Jnvcfcv8BptsnQ==
=PO98
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux