layout | title | permalink | lang | ref |
---|---|---|---|---|
virtuallystolen |
Virtually Stolen! |
/vs.html |
en |
virtuallystolen |
If you have landed on this page it is because you most likely found the sticker "virtually stolen" stuck on your computer screen, mobile phone or tablet. Bravo: you were lucky this time! A dishonest person could have stolen your electronic tool during the time the sticker was placed. While for CASES, the goal is to remind you of some tips for protecting your computer hardware and information security:
- Keep in mind that the loss of equipment is not limited only to the material loss of the asset: with it, all the data, and sometimes the reputation of the concerned person or organization are in danger. [Learn about the impacts of a physical theft.]({% link _knowhow/glossary/PhysicalTheft.markdown %})
- Business travel is a special occasion for loss, theft or destruction of sensitive information. Once on the road or in the air, it is important to keep an eye on your equipment and be aware of the risks involved. "[Be safe]({% link _knowhow/bestpractices/PracticalGuideForBusinessTrips.markdown %})" tells you the pitfalls to avoid.
- Work on a laptop and or a smartphone? what freedom! They can not only be transported out of the company, but also connect to other networks, sometimes unprotected. Take your safety measures!
- Bring Your Own Device (BYOD): More and more people are taking their own devices to work and connecting to the corporate network. This represents productivity benefits, but beware of information security risks! To take advantage of the benefits of BYOD, the company must include it in its IT strategy and [security policy]({% link _knowhow/cisoapproach/SecurityPolicy-SecurityPolicy.markdown %}).