Each month, we focus on staying safe in the digital world, and with good reason. Many modern scams, phishing attempts and cyberattacks begin online. However, cybersecurity doesn’t stop at the screen. Physical security is a critical part of protecting digital assets, focused on preventing unauthorized access to devices, workspaces and data.
A stolen smartphone, lost laptop or a malicious USB drive can give criminals direct access to systems and data. In many cases, these criminals do not need to “hack” or carry out a sophisticated attack; they just need physical access to your device. Follow the tips below to keep your devices and data safe in the real world.
Secure your workspace.
- Ensure doors to offices or other locations containing sensitive material and devices are locked and closed tight. Don’t prop the door open, even for a short time.
- Keep up-to-date records of all issued key cards and physical keys. Be aware of who has a key to your office (as well as your home!).
- Store sensitive documents and external storage devices in locked cabinets when not in use.
- Remove sensitive information from shared spaces, including meeting rooms, printers, fax machines and copiers.
- Shred sensitive documents when no longer needed.
- Your camera and microphone could allow unwanted parties access to your information or workspace. Cover or disconnect your webcam and microphone when not in use. You can use both physical covers as well as settings to maximize your privacy.
- Closed circuit cameras or in-home cameras are an excellent physical security measure. Ensure that you are using MFA and strong passwords so only verified users can access the video feed/footage.
Adopt a clean desk policy.
- Not only is organizing and tidying up your workspace (at your job or at home) good for your mind and productivity, but it is also important for security.
- Never write sensitive information, like a password, on a sticky note.
- Always lock your screen when stepping away, even for a moment.
Protect your devices.
- Mobile devices, like smartphones, are extremely vulnerable to winding up in the wrong hands, especially when you carry multiple devices away from home or the office.
- Always lock your computer when stepping away from your workspace. If you are in a public place, always carry your devices with you (if possible).
- Set all devices to automatically lock after a short period of inactivity.
- Use long passwords to protect your devices; the more complex and unique your passwords are, the more secure your device will be.
- Enable biometric protection settings, such as fingerprint or facial recognition, when available.
- Back up your devices regularly; daily backups are most ideal.
Travel safely with your devices.
- Don’t leave your device unattended. If you must leave your device in a vehicle, be sure it is out of sight and the vehicle is locked.
- If you are in a public place, you should always carry your device with you, even if you get up for a quick moment (for example, to pick up food or drinks).
- Avoid packing devices in checked baggage. Bring them in your carry-on bag and always know where they are.
- Be mindful of “shoulder surfing” when using a device in public. Anyone walking by can see what is on your screen, so take care where you set up to work or what information you access in public. Use privacy screens on your devices when possible.
- Power down devices when not in use. This reduces the likelihood that someone can access it.
- If your device is lost or stolen, use built-in settings (such as Apple’s “Find My iPhone” feature or Android’s “Device Manager”) to locate, lock and/or remotely wipe the device. Work with law enforcement to recover your stolen device; never attempt to do so on your own.
Use caution when plugging in.
- A common and successful tactic implemented by criminals is to leave storage devices, like USB drives or SD cards, in high-traffic areas, like airports or busy office buildings. These devices are preloaded with malware and will infect any device they get plugged into. Never plug a device into your computer unless you are sure of where it came from.
- Avoid charging devices using public USB ports, unless you use a USB data blocker. Public ports can be used to transfer data or install malware on your device.
Cybersecurity consists of multiple layers of precautions. Firewalls, passwords and suspicious emails are important concerns, but keeping your data safe doesn’t stop there. Physical security is one of the most critical and controllable layers at your disposal.
Many serious cyber incidents start with simple oversights, like a door left open or a laptop left unattended. These are not technical failures; they are human mistakes that are preventable. By building strong physical security into everyday routines, you reduce risk not only for yourself but also for all users connected to your systems and data. Small but important actions like locking screens, securing documents and keeping track of your devices amount to meaningful protection.
Cyber Habit of the Month: Recognize and Report Real Estate and Rental Scams
Real estate and rental scams are on the rise, especially during busy moving seasons and tight housing markets. Scammers post fake listings, impersonate legitimate landlords or agents and pressure victims to act quickly. Their tactics include requesting deposits, application fees or personal information before a property can be verified. Common red flags include prices that seem too good to be true, refusal to meet in person or allow a tour, or emails and texts that are unsolicited or filled with urgency. Once they contact you, these scammers will request some type of payment using a non-typical method such as gift cards, wire transfers or cryptocurrency.
Never send money or sensitive information before signing a lease or seeing the property. Verify listings independently by searching the address and confirm the listing agent or property owner through trusted sources.
If you suspect a listing is a scam, don’t interact with it in any way. Report it immediately to the platform hosting the listing, as well as the appropriate authorities. Reporting helps protect others and identifies patterns that can help platforms and authorities track the perpetrators. When house hunting, taking a few extra minutes can save you from significant financial and personal loss.