Physical Security

Physical Security Best Practices

1. Secure Workstations with Locking Cables

  • Tip: Use a security locking cable (or similar device) to physically secure your computer, especially when you’re away from your desk.
  • Why it Matters: A sturdy cable lock deters quick, opportunistic theft by making it harder for someone to “grab and go” with your device.

2. Manually Lock Your Screen

  • Tip: Always lock your screen before stepping away from your workstation (e.g., [Windows + L] on PCs or [Control + Command + Q] on Macintosh).
  • Why it Matters: An unlocked screen leaves your email, files, and other sensitive data open to unauthorized access—even for a short time.

3. Configure an Automatic Idle Lock

  • Tip: Set up a short idle timeout (15 minutes or less) that automatically locks your device when inactive.
  • Why it Matters: Even if you forget to lock your screen, the device will lock itself, reducing the window of opportunity for unauthorized use.

4. Store Devices in Secure Locations

  • Tip: Store laptops and other portable electronics in locked drawers, cabinets, or other secure areas when not in use.
  • Why it Matters: Out-of-sight storage greatly lowers the risk of someone noticing and stealing a device.

5. Avoid Leaving Devices in Plain View

  • Tip: Don’t leave your computer or phone unattended on a table, car seat, or any other visible spot.
  • Why it Matters: Visible, easily accessible devices are prime targets for thieves looking for quick opportunities.

6. Leverage Location Tracking Tools

  • Tip: Enable built-in tracking (e.g., “Find My Device”) or third-party locator apps on laptops, smartphones, and tablets.
  • Why it Matters: If a device goes missing, location tracking can help you locate and potentially recover it and may allow you to remotely lock or wipe the data.

7. Use Encrypted Devices and Drives

  • Tip: Encrypt all devices (laptops, smartphones, tablets) and use encrypted thumb drives or flash drives for sensitive files.
  • Why it Matters: Encryption ensures that even if a device is physically stolen, the data remains protected and unreadable without proper authorization.

8. Enable Lock Screens on Every Device

  • Tip: Protect all devices with passwords, PINs, or biometric locks.
  • Why it Matters: A lock screen serves as the first line of defense. Even if someone gains possession of your device, they can’t easily access your information.

9. Report and Replace Lost IDs Immediately

  • Tip: If your Sun Card or other organizational badge is lost or stolen, report it immediately and request a replacement.
  • Why it Matters: IDs often grant access to buildings and systems. Deactivating a stolen ID prevents unauthorized access and potential misuse of your credentials.

Why Physical Security Matters for Information Security

  • Prevents Unauthorized Access: Physical control over devices and ID badges helps stop unauthorized entry to confidential data or restricted areas.
  • Protects Sensitive Data: Even strong digital security can be undermined if an attacker gains physical access to your device or files.
  • Reduces Financial and Operational Impact: Losing devices—or their data—can result in costly replacements, data breaches, or regulatory fines.
  • Supports Compliance and Trust: Many organizations must follow strict regulations regarding data handling. Demonstrating sound physical security is integral to compliance and maintaining stakeholder confidence.