This information is over 2 years old. Information was current at time of publication.{"id":1364,"date":"2009-02-09T08:46:04","date_gmt":"2009-02-09T13:46:04","guid":{"rendered":"http:\/\/www.hsls.pitt.edu\/updatereport\/?p=1364"},"modified":"2009-02-09T08:46:04","modified_gmt":"2009-02-09T13:46:04","slug":"keep-your-laptop-secure","status":"publish","type":"post","link":"https:\/\/info.hsls.pitt.edu\/updatereport\/keep-your-laptop-secure\/","title":{"rendered":"Keep your Laptop Secure"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-1460\" style=\"margin-left: 10px;margin-right: 10px\" src=\"https:\/\/info.hsls.pitt.edu\/updatereport\/files\/2009\/02\/laptop-security-004-150x150.jpg\" alt=\"laptop-security-004\" width=\"150\" height=\"150\" \/>Have a laptop computer? Have you ever left it unattended? If so, you may want to reconsider laptop security options as thefts can happen anywhere. The precautions below can help keep both your computer and its data safe.<\/p>\n<p><strong>Keep the laptop with you at all times.<\/strong><br \/>\nHave you ever left your laptop sitting on a library table while you took a quick break?\u00a0 Unfortunately, we love our laptops for the same reasons they appeal to thieves &#8211; their portability and computing power. Leaving your machine unattended for just a few minutes could have devastating consequences.<\/p>\n<p><strong>Using a work laptop?<\/strong> <strong>Follow your department or unit laptop security policy<\/strong><br \/>\nIT laptop security policies are designed to protect the user, the hardware, and the data.\u00a0 As the user, you are an integral part of this equation. Granted, some IT policy restrictions can be annoying; but playing online games or watching YouTube is not worth the risk of a data breach.<\/p>\n<p><strong>Invest in a laptop security cable<\/strong><br \/>\nThis prevention tool will prevent crimes of opportunity.\u00a0 The cables and locks (often sold as a set) are readily available from most computer stores.<\/p>\n<p><strong>Software based security<\/strong><br \/>\nThis type of software allows your laptop to be tracked, located, and possibly recovered if stolen. The University of Pittsburgh\u2019s <a href=\"http:\/\/technology.pitt.edu\/software\/browse.html\">CSSD<\/a> offers Lojack at no cost to students and Computrace to faculty and staff.\u00a0 For those not affiliated with the University, Lojack is also available via paid subscription. See the Lojack <a href=\"http:\/\/www.lojackforlaptops.com\/\">Web site<\/a> for more information.<\/p>\n<p>~ Fran Yarger<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have a laptop computer? Have you ever left it unattended? If so, you may want to reconsider laptop security options as thefts can happen anywhere. The precautions below can help keep both your computer and its data safe. Keep the laptop with you at all times. Have you ever left your laptop sitting on a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"issue-archives","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[-1],"class_list":["post-1364","post","type-post","status-publish","format-standard","hentry","category-7","avhec_catgroup-issue-archives"],"_links":{"self":[{"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/posts\/1364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/comments?post=1364"}],"version-history":[{"count":0,"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/posts\/1364\/revisions"}],"wp:attachment":[{"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/media?parent=1364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/categories?post=1364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/info.hsls.pitt.edu\/updatereport\/wp-json\/wp\/v2\/tags?post=1364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}