We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJanae Hunn
Modified over 2 years ago
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. The rapid growth in laptop computing has made portable systems targets of theft around the world. Follow these guidelines before and after removing laptops from corporate property to minimize the risk of loss. Secure Your Laptop Buy a cable lock that allows you to physically lock your laptop to a piece of heavy furniture. Place your laptop in a locked cabinet when leaving for an extended time. Avoid Using Obvious Computer Bags Carry your laptop more discreetly in something common such as a briefcase or suitcase. Never Write Down Passwords Never write down or leave access numbers or passwords in the carrying case. Keep Your Computer Close to Your Body Set down your laptop only if you can place it between your feet or against your leg (to help you monitor its location). Never Check Your Laptop as Luggage Carry your laptop with you onto an airplane instead of checking it with your luggage. Watch Your Laptop at Airport Security Keep an eye on your computer when going through airport security stations. Don't release your laptop until the person in front of you has gone through the metal detector, and retrieve it immediately after it has been screened. Use a Security Device Consider buying a security device that sounds an alarm when your laptop is improperly moved. Use a Laptop Privacy Screen Consider buying a privacy screen that prevents people from seeing your work over your shoulder. The privacy screen fits over your laptop screen and restricts the viewing angle. You will see the content only when you are directly in front of the screen, while others will see a blank or black screen from all other angles. Keep Your Laptop with You Keep your laptop with you as much as possible. If you can't keep it with you, keep it out of sight. For example, if you must leave your laptop in your vehicle, lock it in the trunk. Never Leave Your Laptop in Your Hotel Room If possible, do not leave your laptop in your hotel room or with the front desk. If you must leave it in your room, place it out of view and post the do not disturb sign on your door. Change the password associated with the corporate user ID. If you cant, contact your helpdesk for assistance. Report the theft to the local police and to Corporate Security. If customer data was on the laptop, contact your manager. If a Laptop Is Stolen, Immediately Do the Following:
2 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. Get the Latest Software Updates Keep your laptop up-to-date with the latest software updates. For Microsoft® Windows® XP, go to For other software, go to the manufacturers Web sites.http://windowsupdate.microsoft.com Use Encryption Use the Encrypted File System (EFS) on all folders containing sensitive corporate or customer information. To use this, your computer must be using a NTFS file system. Back Up Your Data Back up all data that is sensitive or cannot be easily replaced. Back up data to a safe location on the corporate network. After confirming a successful backup, delete all databoth corporate and customer relatedthat is not essential for the job being performed. Be sure to empty the Recycle Bin as part of the process. Use Strong Passwords Use a strong password on all local accounts, especially the Administrator Password. Use a strong password on your Exchange personal folder (pst) file. Do not select the Save this password in your password list check box. Use a Password-Protected Screen Saver Use a password-protected screen saver set to activate after a maximum of 15 minutes of inactivity. Disable Dial-Up Networking Password Disable the Save password option in Dial-Up Networking. Store Removable Hard Drive If the laptop has a removable hard drive, disengage it from the rest of the device and store it in a separate, secure location. Write Down Asset Information Record in a safe place the laptop serial number, asset number, and model number. Download the Latest Antivirus, Antispyware, and Firewall Software Ensure that the latest antivirus software is loaded and running on your laptop. Also, you will want to make sure the firewall on your computer is turned on. You can visit for more information on spyware and links to some of the many spyware scanners that are available for download.http://www.microsoft.com/spyware
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1.1 System Performance Security Module 1 Version 5.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
10 Essential Security Measures PA Turnpike Commission.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Computer Security Keeping you and your computer safe in the digital world.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices Smartphones Laptops Tablets USB Memory Portable Media Player Handheld.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
®® Microsoft Windows 7 Windows Tutorial 9 Maintaining Hardware and Software.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
ESCCO Data Security Training David Dixon September 2014.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
New Data Regulation Law 201 CMR TJX Video.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
A virus is illegal computer code that can alter programs or destroy data. A virus can copy itself onto programs, spreading its damaging effects.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
© 2017 SlidePlayer.com Inc. All rights reserved.