Physical Security


Choosing a High Security Lock | Video by bosnianbill

Equipment Security

Your computer is vulnerable when you leave it unattended while logged in. The temporary departure might be to go to the bathroom, join a meeting, or take lunch. Regardless, someone could use that criminal opportunity to steal your data, fake your identity, or sabotage the business. In defense of these risks, many companies have a policy that their employees must log out of their computer before leaving it unattended. As a general rule, you must know when equipment is in a sensitive state and ensure that it is switched to a protected state before trusted observers release their attention.