Locking Your Device
18/02/2019

How secure is your device? Are you able to use your device without having to worry about your data being compromised?
Never leave devices unattended – the physical security of your device is important.
If you need to leave your laptop, phone, or tablet for any length of time – lock it so it can’t be used by anyone else. (See the IT Users Policy https://intranet.cranfield.ac.uk/it/PoliciesandProcedures/ITUsersPolicy.pdf).
For desktop computers, you have the option to shut-down the system when not in use or to lock your screen.
To lock a laptop or desktop which uses Windows press Ctrl-Alt-Del and Select Lock or use Windows Key + L
To lock an Apple Mac’s screen, simultaneously press Control + Shift + Eject. (However if you have a newer Mac that doesn’t have an optical drive (and therefore has no eject key) press Control + Shift + Power).
Locking your device helps prevent others from viewing or using your device when you’re not around. The security of your device is your responsibility.
Devices should be set to automatically go to screensaver after a certain amount of inactivity. Do not depend on this time out for your security. Manually lock your device when you leave it unattended. (For some devices shutting down the device is suitable alternative).
For a mobile devices (tablet or phone usually running either Android or iOS) – set the device to require a strong password/PIN. Additionally set it to automatically lock when not in use.
- For apple iPhones/iPads press the sleep/wake button.
- For Android phones/tablets a single press of the power button commonly manually locks the device.
Some devices can be erased remotely, or erase themselves if the password/PIN is entered incorrectly too many times.
Where these settings exist consider turning these on to protect information in the case of theft or loss.
Categories & Tags:
Leave a comment on this post:
You might also like…
Introducing… W – Bloomberg’s Security Worksheet function
Bloomberg users, are you fed up hitting download limits? Do you want to create custom templates that download only the data you want and nothing else? Using many of Bloomberg's download templates often leads to ...
Managing your research data – a progress update
As you will already be aware, in 2024 we undertook a major, multi-phased project to redevelop our University research information system (CRIS), our institutional repository (CERES) and our research data management software (CORD). The ultimate ...
Using Watch Folders in Mendeley
Looking for a quick and easy way of adding documents to your Mendeley library? Wouldn't it be great if you could add PDFs to a folder on your computer and these could be automatically imported ...
Do you know what makes a Technical Report special?
Writing a technical report is a little different to writing a lab report or an essay for your tutors, requiring a different approach, communication skills and format. What are technical reports? Technical reports are formal, ...
Gear up for the future of vehicle design: Introducing the MSc in Virtual Prototyping for Vehicle Structures (VPVS)
The automotive and motorsport industries are in a constant state of evolution. Light weighting, electrification, and ever-stringent safety regulations are driving a revolution in vehicle design. But this innovation requires a ...
Finding industry profiles in Library resources
When researching an industry; its size, value and performance; competitors, brands and trends in the market etc., we recommend having a look at the following services. These can all be accessed via the SOM Library's ...