Laptop, Tablet and Smartphone Security Measures

SecurityTip: Implement security measures immediately as soon as you get your laptop, tablet or smartphone.

Document identifying information Departments and users/owners should keep all laptop, tablet and smartphone identifying information such as make, model, serial number, and inventory number (if any), as well as emergency telephone numbers used to report a loss or theft in a safe, accessible location, but not with the device. It is also recommended that ownership be registered with the manufacturer.

  1. Configure security settings for optimum security.
  2. For laptops, use anti-virus software.  Run and update it regularly.
  3. For laptops and tablets, configure your devices so they update their applications automatically with latest patches. Patch often.
  4. For smartphones, enable a device lock that requires a password to log on to the phone. Set password lock features.
  5. Disable guest account features.
  6. Disable all auto-login and save password functions.
  7. Do not load passwords or PINS in cleartext files on the device unless using a valid password vaulting software that encrypts the file. Passwords and personal identification numbers (PINS) are your keys to e-mail and other accounts, keys that you do not want in the wrong hands! Protect your identity by keeping cleartext passwords and PINS off your device.
  8. Consider insuring your device. Consider insuring your personal device for repair, replacement, accidental damage, and theft.
  9. Consider purchasing anti-theft software. Anti-theft software for your device will locate your device in case of theft or the anti-theft company will insure for full replacement if not found.

Other Security Tips

Select the links below for tips on securing your devices.

  1. Safeguard Laptop and Tablet Contents
  2. Secure the Wireless Laptop or Tablet Connection
  3. Physically Safeguard the Laptop, Tablet or Smartphone
  4. Secure the Laptop, Tablet or Smartphone When Traveling
  5. Report Laptop Damage, Loss, Theft, and Security Breaches

For more information:

TOP