ISS Tech Bytes
When Mobile Devices Should Not be Mobile
Volume 6, No. 6
Mobile devices continue to have a positive effect on promoting connectivity and allowing access to data at all--or almost all--times; however, with convenience comes responsibility. This is where each one of us can help increase security and enhance loss prevention here at Cal Lutheran. Please take a few minutes to think about the computers and electronic and digital devices you use and how you can assure they are not so mobile; i.e., how to keep them secure. Consider the following tips:
·The first line of defense is locking the door when no one is in the office, classroom, or workspace. Even if there are people in adjacent offices, that does not preclude someone from entering and taking a computer, iPad or other tablet, or a mobile phone.
·Laptops should be secured with a locking cable; desktop computers in shared offices should be secured with a locking cable. If you don't have a cable, contact the Help Desk (805-493-3698).
·Note that when Media Services delivers a laptop to a classroom, it is locked down with a security cable.
·On days when you do not take your laptop home, the laptop should be secured in a cabinet or drawer that is locked. The same goes for mobile phones and tablets.
·You should be sure to close and lock the door at the end of the work day for any office or conference room where there is an LCD projector or wall-mounted television. (P.S. Don’t forget to turn off the overhead projector if it is on.)
·Mobile devices are a great convenience, but there are times when they should not be mobile. Please make an extra effort to follow the guidelines above and reduce your risk and others.
*This Issue’s Techno Term
Term: (SST) Secure Storage Toolkit
Definition: Secure flash storage mechanism that enables diverse access control mechanisms; SST enables storing credentials and keys safely and using stored keys to protect data objects.
If you have questions or need assistance, please call the Help Desk at (805) 493-3698 or send e-mail to firstname.lastname@example.org Additional information is available at the Computer Training Website; in addition, an archive of previous Tech Bytes issues is located at http://www.callutheran.edu/iss/training/tech_bytes/
« Back to Tech Byte Archive