Published on Computing & Communications Services (https://www.uoguelph.ca/ccs)

Home > InfoSec Blog - Preventing Device Theft

InfoSec Blog - Preventing Device Theft

May 2, 2016

 

With an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you be prepared in case your laptop is stolen or your smartphone is misplaced.

  • Don't leave your device alone, even for a minute! If you're not using it, lock your device in a cabinet or drawer, use a security cable, or take it with you. It's not enough to simply ask the stranger next to you in a library or coffee shop to watch your laptop for a few minutes.
  • Differentiate your device. It's less likely that someone will steal your device and say they thought it belonged to them if your device looks unique. Sometimes these markings make the laptop harder to resell, so they're less likely to be stolen. Use a permanent marking, engraving, or tamper-resistant commercial asset tracking tag.
  • Delete sensitive information. Don't keep any restricted data on your laptop. We recommend searching your computer for restricted data and deleting it. Restricted data includes your Social Security number, credit card numbers, network IDs, passwords, and other personally identifiable information. You'd be surprised how easy it is to forget that this information is on your computer!
  • Back it up. Set a reminder to backup your data on a regular basis! Keep an external copy of important files stored on your laptop in a safe location in case it is lost or stolen. Your photos, papers, research, and other files are irreplaceable, and losing them may be worse than losing your device.
  • Encrypt information. Protect your personal data with the built-in disc encryption feature included with your computer's operating system (e.g., BitLocker or FileVault).
  • Record the serial number. Jot down the serial number of your device and store it in a safe place. This information can be useful for verifying your device if it's found.
  • Install software. Install and use tracking and recovery software included with most devices (e.g., the "Find iDevice" feature in iOS) or invest in commercial products like LoJack [1] or Prey [2]. Some software includes remote-wipe capabilities. This feature allows you to log on to an online account and delete all of the information on your laptop. There are both paid and free versions of this type of software, and each provides different levels of features. Search online to find the best combination of cost and functions to meet your needs.

 

Source: Educause Security Awareness

Keywords: 
mobile device safety [3]

Our Vision

To be technology and knowledge solution leaders, partnering with University communities, enabling excellence in teaching, learning and research.

Our Purpose

Changing lives, improving life by enabling our community.

Our Core Values

Service Culture, Integrity, Individual Leadership, Teamwork, Agility, Communication

Find us on Social Media

  • RSS - RSS

  • YouTube - CCS – University of Guelph

  • Twitter - U of G CCS IT Service Desk

About CCS

Computing & Communications Services (CCS) is U of G’s central IT department, providing core IT services to the greater campus community.

Click4Assistance UK Live Chat Software

Source URL:https://www.uoguelph.ca/ccs/preventtheft

Links
[1] http://lojack.absolute.com/en [2] http://www.preyproject.com/ [3] https://www.uoguelph.ca/ccs/tags/mobile-device-safety