Leaving your computer unattended and unsecured gives potential thieves an opportunity to steal your confidential information, or to install viruses, Trojans, or other damaging software onto your computer.
Public computer labs are a popular hangout for "shoulder surfers"--people who look over your shoulder while you type in your user name, password, or other sensitive information. It's very easy to decipher which keys you're typing for your password, no matter how fast you type. So just be on the lookout for these surfers while you log it. Also, be sure to log out when you're done.
Try not to print out confidential information in a public computer lab. However, if you must, remove it from the printer as soon as it prints. Don't wait or else someone could snag it!
If your dorm room or office is in an open suite, or if you use a laptop in more than one location, your computer and sensitive files could be at risk. If you use a laptop, be sure to physically secure it with a lock. To secure your files and sensitive data, use a system password.
There are two simple methods to secure your personal computer when you leave it unattended. You can either log off your computer when you leave, requiring a password to log back on, or you can utilize a password-protected screen saver. There are pros and cons to both methods. Evaluate them in the chart below and decide for yourself which option you prefer. Directions on how to set up these options are below.
| PROS | CONS | |
|---|---|---|
| Log-in password | When you log off, your computer is secure from the moment you leave until the moment you return | You have to remember to log off every time you leave your computer |
| Screen saver password | Comes up automatically if you leave your computer abruptly. | In the few minutes it takes for the screen saver to come up, someone could hop on your computer. |
To set up a password for log-in:
To set up a password-protected screen saver:
To set up a password for log-in:
To set up a password-protected screen saver:
Laptops are so common now that they are often seen simply as portable desktop computers. But laptops require some extra precautions due to their physical vulnerabilities. Following these precautions can help prevent expensive repairs.
Don't leave confidential printouts on your desk, even if you are only away for a few moments--keep them locked in a secure place. If you no longer need these printouts, do not just simply throw them away--shred them.
"Dumpster diving" is a popular activity where hackers obtain others' confidential information from sensitive documents that were not thrown away properly. Personal home-use/small office-use shredders are inexpensive and readily available. "Cross-cut" models are preferable to "strip" models because cross-cut models shred documents into more, smaller pieces than the strip models, making it increasingly difficult for dumpster diving thieves to tape back together.
Lastly, before selling or donating old computers, make sure that sensitive data is removed. Files that are simply "dragged to the trash" can be easily recovered, so use a secure delete utility (such as those included with PGP and Norton Utilities) to wipe all hard drives in the system. It is best to set for multiple wipes, at least three passes.