Locking Your Device
18/02/2019

How secure is your device? Are you able to use your device without having to worry about your data being compromised?
Never leave devices unattended – the physical security of your device is important.
If you need to leave your laptop, phone, or tablet for any length of time – lock it so it can’t be used by anyone else. (See the IT Users Policy https://intranet.cranfield.ac.uk/it/PoliciesandProcedures/ITUsersPolicy.pdf).
For desktop computers, you have the option to shut-down the system when not in use or to lock your screen.
To lock a laptop or desktop which uses Windows press Ctrl-Alt-Del and Select Lock or use Windows Key + L
To lock an Apple Mac’s screen, simultaneously press Control + Shift + Eject. (However if you have a newer Mac that doesn’t have an optical drive (and therefore has no eject key) press Control + Shift + Power).
Locking your device helps prevent others from viewing or using your device when you’re not around. The security of your device is your responsibility.
Devices should be set to automatically go to screensaver after a certain amount of inactivity. Do not depend on this time out for your security. Manually lock your device when you leave it unattended. (For some devices shutting down the device is suitable alternative).
For a mobile devices (tablet or phone usually running either Android or iOS) – set the device to require a strong password/PIN. Additionally set it to automatically lock when not in use.
- For apple iPhones/iPads press the sleep/wake button.
- For Android phones/tablets a single press of the power button commonly manually locks the device.
Some devices can be erased remotely, or erase themselves if the password/PIN is entered incorrectly too many times.
Where these settings exist consider turning these on to protect information in the case of theft or loss.
Categories & Tags:
Leave a comment on this post:
You might also like…
Want to know more about research methods?
Research methods are the strategies and tools used to gather, analyse and interpret data or evidence to uncover new information or create better understanding of a topic. Research methodology is the theory, justification and assumptions ...
How do I cite…. items with multiple authors in APA7?
This post follows on from our post on using 'et al' in citations but has a slightly different focus - do read them both! As you may know, in-text citations can be written either as ...
The British Library Business and IP Centre
Did you know that the Business and IP Centre at the British Library, on the Euston Road in London, has a variety of events and resources to support entrepreneurs and small businesses? If you register ...
Getting started on your Master’s thesis
Please note: This post is intended to provide advice to all students undertaking a thesis in the Faculty of Engineering and Applied Sciences. There is separate advice for School of Management students. Choosing your thesis ...
A key strength of the Management MSc: Thesis-linked Internships for all students
What drew me to Cranfield was not just its reputation, but the practical, real-world approach embedded in the curriculum. The course offers the chance to work on live case studies with companies and even ...
Register for a British Library Reader’s Pass
The British Library (Euston, London) is open to students and researchers who wish to use its world-class collections and resources. To do this, you need to register for a reader's pass. Begin by reading the ...