There is no doubt that we are now living in a digital world; documents, conversations, pictures, music and even our money are digitized! While we pay attention to information security, we shall not overlook the importance of physical security.
To protect valuable/sensitive data in our electronic devices against theft, the first thing that comes across your mind would be Password. However, if you forget to logout your devices after use, the password will lose its function. So please remember to logout each time, even if you will be away for several minutes. Enable auto-lock feature with a passcode to screen lock your device when it is not in use after a certain period of time is also a wise choice. Turn off Bluetooth and Personal Wi-Fi Hotspot after use as hackers may make use of these channels to intrude your devices. And of course, the password itself has to be protected securely: never share your passwords and make sure no one is peeping as you enter your password.
Another simple yet easily forgotten rule is never leave your mobile devices unattended. With the popularity of electronic devices, even non-IT professionals know how to crack them. How about using finger authentication, is it safe from being cracked? The answer is no unfortunately because it can be bypassed easily. So, always keep your devices within your eyesight and within your reach, beware of pickpockets. When a notebook is used in a public event, you may use a cable lock which fastens the notebook to a table or any fixed object. You may also consider enabling remote wipe on mobile devices beforehand so that you can remotely erase all data in case of loss.
Sometimes, we have to work on printed documents, which contain sensitive information, and are put or piling up on working desks. Please keep them in non-transparent folders or place them in a secure place, e.g. a locked drawer. In case you need to pass the printed sensitive documents, try to do it in person, but not leaving it on his desk. When disposing sensitive documents, use the paper shredder. Last but not least, please lock your room after work and drawers after use, protect your key safely and do not leave it in the drawer keyhole.
While vast efforts are being invested in inventing new and improving existing protection mechanisms, physically securing your assets from being stolen is still one of the most effective measures. We thank you for your attention and we wish everyone happy and safe computing experiences.
IT.ServiceDesk@cityu.edu.hk