Protection In The Real World

Physically protecting your data is often overlooked (and its importance underestimated) in favor of more technical and dramatic issues such as hacking, viruses, Trojans, and spyware. However, breaches of physical security can be carried out with little or no technical knowledge on the part of an attacker. Moreover, accidents and natural disasters are a part of everyday life, and in the long term, are inevitable. Taking simple steps in your day-to-day routine can help safely manage when and where your data is exposed to unnecessary risk.

  • Laptops and Portable Disks - Laptops and handheld computers pose special physical security risks. A thief can easily steal the entire computer, including any data stored on its disk as well as network logon passwords that may be saved. If employees use laptops at their desks, they should take them with them when they leave or secure them to a permanent fixture with a cable lock. Portable USB Drives pose much more of a risk, since they can be easily forgotten or stolen. By fastening your drive to a keychain or locking safely in a drawer, you can easily protect your data and always know where it is at any given time. Many drives can be set up with security features like like a password lock and file encryption.

Information on password protecting your drive can be found here.

Information on different types of cable locks can be found here.

  • One Man's Trash... - Although it might seem ridiculous, criminals can find and steal important data from a place where no sensible human would ever go: the garbage. Throwing away an old USB Drive or CD without wiping them first is a jackpot for a dumpster-diving thief. Since many buildings do not give the same protection to their trash that they give to their offices, dumpsters have become an attractive target for people searching for sensitive employee information. You shred your important documents before throwing them away, shouldn't you do the same for your digital data?
  • A Deadly Find - You're walking into work one morning and you notice a small, battered USB drive lying in the parking lot. You suspect it was accidentally dropped by one of your coworkers, so once you're inside you plug it in to your computer to get some clues on the original owner's identity. However, unbeknownst to you, this is exactly what the original owner had planned from the beginning. The USB drive was loaded with deadly spyware that got to work the moment you plugged it into your machine. While you are sifting through its files trying to find out who to contact, it's sifting through yours, transmitting your information (and the University's) right back to the cyber criminal that planted the thumb drive in the parking lot the night before. Anonymous drives should be treated with caution, especially if they're found in suspicious places. To avoid confusion, don't forget to label yours with the appropriate contact information so it can be safely returned if it's lost or stolen.
    UCCS Help Desk CU Denver & Anschutz Help Desk CU Boulder Help Desk CU Information Systems Help Desk

    719.225.3536

    helpdesk@uccs.edu

    303.724.4357

     UCD-ITS-HELPDESK@ucdenver.edu

    303.735.4357

    help@colorado.edu

    303.860.4357

    help@cu.edu