Physically secure your devices

Physically secure your devices

Your computer or laptop is the primary tool to access, store, and create your files, some of which are confidential. It's becoming easier to access and store important information on other devices as well, especially mobile ones. Computers and mobile devices offer quick access to the information you need: email, UDSIS, your bank's site, Facebook, etc.—easy for you, and just as easy for anyone else who gets hold of your devices.

To protect your confidential files and other information including usernames and passwords, you must protect your devices from damage and theft, and you must prevent others from easily accessing your information in the event that your devices are stolen. Refer to the guidelines below for more information.

Guidelines

More information

LoJack (AbsoluteSoftware)
Commercial application to track and potentially recover a stolen computer.

Prey
Open source application for tracking your computer or Android phone.

Find my iPhone (Apple)
If you subscribe to Apple's MobileMe service, this app will allow you to track your iPhone, iPod Touch, and iPad if you lose them.

[an error occurred while processing this directive]