We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJanae Hunn
Modified over 2 years ago
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. The rapid growth in laptop computing has made portable systems targets of theft around the world. Follow these guidelines before and after removing laptops from corporate property to minimize the risk of loss. Secure Your Laptop Buy a cable lock that allows you to physically lock your laptop to a piece of heavy furniture. Place your laptop in a locked cabinet when leaving for an extended time. Avoid Using Obvious Computer Bags Carry your laptop more discreetly in something common such as a briefcase or suitcase. Never Write Down Passwords Never write down or leave access numbers or passwords in the carrying case. Keep Your Computer Close to Your Body Set down your laptop only if you can place it between your feet or against your leg (to help you monitor its location). Never Check Your Laptop as Luggage Carry your laptop with you onto an airplane instead of checking it with your luggage. Watch Your Laptop at Airport Security Keep an eye on your computer when going through airport security stations. Don't release your laptop until the person in front of you has gone through the metal detector, and retrieve it immediately after it has been screened. Use a Security Device Consider buying a security device that sounds an alarm when your laptop is improperly moved. Use a Laptop Privacy Screen Consider buying a privacy screen that prevents people from seeing your work over your shoulder. The privacy screen fits over your laptop screen and restricts the viewing angle. You will see the content only when you are directly in front of the screen, while others will see a blank or black screen from all other angles. Keep Your Laptop with You Keep your laptop with you as much as possible. If you can't keep it with you, keep it out of sight. For example, if you must leave your laptop in your vehicle, lock it in the trunk. Never Leave Your Laptop in Your Hotel Room If possible, do not leave your laptop in your hotel room or with the front desk. If you must leave it in your room, place it out of view and post the do not disturb sign on your door. Change the password associated with the corporate user ID. If you cant, contact your helpdesk for assistance. Report the theft to the local police and to Corporate Security. If customer data was on the laptop, contact your manager. If a Laptop Is Stolen, Immediately Do the Following:
2 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. Get the Latest Software Updates Keep your laptop up-to-date with the latest software updates. For Microsoft® Windows® XP, go to For other software, go to the manufacturers Web sites.http://windowsupdate.microsoft.com Use Encryption Use the Encrypted File System (EFS) on all folders containing sensitive corporate or customer information. To use this, your computer must be using a NTFS file system. Back Up Your Data Back up all data that is sensitive or cannot be easily replaced. Back up data to a safe location on the corporate network. After confirming a successful backup, delete all databoth corporate and customer relatedthat is not essential for the job being performed. Be sure to empty the Recycle Bin as part of the process. Use Strong Passwords Use a strong password on all local accounts, especially the Administrator Password. Use a strong password on your Exchange personal folder (pst) file. Do not select the Save this password in your password list check box. Use a Password-Protected Screen Saver Use a password-protected screen saver set to activate after a maximum of 15 minutes of inactivity. Disable Dial-Up Networking Password Disable the Save password option in Dial-Up Networking. Store Removable Hard Drive If the laptop has a removable hard drive, disengage it from the rest of the device and store it in a separate, secure location. Write Down Asset Information Record in a safe place the laptop serial number, asset number, and model number. Download the Latest Antivirus, Antispyware, and Firewall Software Ensure that the latest antivirus software is loaded and running on your laptop. Also, you will want to make sure the firewall on your computer is turned on. You can visit for more information on spyware and links to some of the many spyware scanners that are available for download.http://www.microsoft.com/spyware
Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 2, 2008.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
HIPAA Security Awareness What You Need To Know. Training Overview This course will discuss the following subject areas: How this training relates to you.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Protecting your Computer The things you MUST know.
How to protect your laptop, smartphone & other mobile devices CYBER SECURITY ON THE GO TCU Information Security Services.
University Services. Agenda Technology Support Data Privacy and Security Software and Hardware Discounts for U of M Staff.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
Personal Information Security and Malware Awareness Workshop Bard College at Simons Rock Information Technology Services (ITS) Summer 2012 (Please sign.
Awareness - Protecting our Data Personally Identifiable Information (PII)
Laptop Orientation 2013 Welcome Please do not open anything yet.
Meet Grace! Grace is our newest team member! She is here to make it easier to keep track of all your HR related documents digitally. Grace will always.
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The.
Welcome to the SPH Information Security Learning Module.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Computer Hope Copyright © Cannady ACOS. All rights reserved.
NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
CYBER SECURITY October 2009 ARE YOU AWARE? The Federal Trade Commission reports that: For the seventh year in a row, identity theft tops the list, accounting.
Services Course Windows Live SkyDrive Participant Guide.
COMPUTER NETWORKS. COMMUNICATION BETWEEN COMPUTERS For a computer to communicate with each other (which may be a completely different system) an interface.
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
1 Information Security Awareness Training: Good Computing Practices for Confidential Electronic Information Information Security Training for all Workforce.
Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses facilities.
Jump to Contents Instructor Tutorial essignments.com Paperless assignment submission system.
Virginia Department for Aging and Rehabilitative Services.
© 2016 SlidePlayer.com Inc. All rights reserved.