Physical Security
Physical Security Best Practices
1. Secure Workstations with Locking Cables
- Tip: Use a security locking cable (or similar device) to physically secure your computer, especially when you’re away from your desk.
- Why it Matters: A sturdy cable lock deters quick, opportunistic theft by making it harder for someone to “grab and go” with your device.
2. Manually Lock Your Screen
- Tip: Always lock your screen before stepping away from your workstation (e.g., [Windows + L] on PCs or [Control + Command + Q] on Macintosh).
- Why it Matters: An unlocked screen leaves your email, files, and other sensitive data open to unauthorized access—even for a short time.
3. Configure an Automatic Idle Lock
- Tip: Set up a short idle timeout (15 minutes or less) that automatically locks your device when inactive.
- Why it Matters: Even if you forget to lock your screen, the device will lock itself, reducing the window of opportunity for unauthorized use.
4. Store Devices in Secure Locations
- Tip: Store laptops and other portable electronics in locked drawers, cabinets, or other secure areas when not in use.
- Why it Matters: Out-of-sight storage greatly lowers the risk of someone noticing and stealing a device.
5. Avoid Leaving Devices in Plain View
- Tip: Don’t leave your computer or phone unattended on a table, car seat, or any other visible spot.
- Why it Matters: Visible, easily accessible devices are prime targets for thieves looking for quick opportunities.
6. Leverage Location Tracking Tools
- Tip: Enable built-in tracking (e.g., “Find My Device”) or third-party locator apps on laptops, smartphones, and tablets.
- Why it Matters: If a device goes missing, location tracking can help you locate and potentially recover it and may allow you to remotely lock or wipe the data.
7. Use Encrypted Devices and Drives
- Tip: Encrypt all devices (laptops, smartphones, tablets) and use encrypted thumb drives or flash drives for sensitive files.
- Why it Matters: Encryption ensures that even if a device is physically stolen, the data remains protected and unreadable without proper authorization.
8. Enable Lock Screens on Every Device
- Tip: Protect all devices with passwords, PINs, or biometric locks.
- Why it Matters: A lock screen serves as the first line of defense. Even if someone gains possession of your device, they can’t easily access your information.
9. Report and Replace Lost IDs Immediately
- Tip: If your Sun Card or other organizational badge is lost or stolen, report it immediately and request a replacement.
- Why it Matters: IDs often grant access to buildings and systems. Deactivating a stolen ID prevents unauthorized access and potential misuse of your credentials.
Why Physical Security Matters for Information Security
- Prevents Unauthorized Access: Physical control over devices and ID badges helps stop unauthorized entry to confidential data or restricted areas.
- Protects Sensitive Data: Even strong digital security can be undermined if an attacker gains physical access to your device or files.
- Reduces Financial and Operational Impact: Losing devices—or their data—can result in costly replacements, data breaches, or regulatory fines.
- Supports Compliance and Trust: Many organizations must follow strict regulations regarding data handling. Demonstrating sound physical security is integral to compliance and maintaining stakeholder confidence.