- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
Securing Physical Devices
- Limit access to the device
- Keep in secured areas
- Keep device attended when outside secure areas
- When storing or leaving devices unattended
- Keep devices out of sight where possible
- Keep device in a secure area
- Observe device and cables to ensure what is plugged in is expected
- Implement full disk encryption and passcodes on devices to mitigate risks if device is lost
- Securely wipe the device when data is no longer needed