|
|
|
|
PC Security in the Office
A stolen computer represents more than the loss of a physical
asset. CDC is entrusted with information, kept on our automated systems, that
is highly sought by the ‘wrong parties’. This includes individually identified
health data, industry wide data, proprietary information from private companies,
anti-terrorism data, and data regarding pending governmental decisions affecting
the health of the nation.
Some foreign governments openly support or practice corporate
espionage and "information warfare" to obtain intellectual properties,
cause harm to systems, or hide their attempted activities by appearing to be
someone else.
Theft or unauthorized access to your system can often be
done in a matter of seconds, but can be avoided by adhering to the following
tips:
- Install a security cable or locking device;
- Logout of the system when you are finished working (Doing
so will allow you to log onto the LAN from elsewhere, if needed, will document
your action of closing your active session (protecting you), and will serve
an a positive example to others);
- Enable your screen saver with password, max time 8 minutes
(Setting a maximum of 8 minutes of non-use before the screen-saver is activated
represents a reasonable balance of efficient use and reliable protection);
- Use a power-on password (This can deter unauthorized
persons from accessing your computer, but its use can interfere with technical
staff, and should be done only with written permission of your LAN Administrator)
|
|
|