Physical Security
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help
Physical security is just as important as online security in protecting yourself, your data and your devices. Remember to lock it up or lock it down before you leave it.
Top Tips for physical security
- Lock your computer before leaving your desk
- Keep confidential paperwork in a locked drawer
- When traveling, store your devices in a safe or take them with you
- Use a PIN, a password or fingerprint ID to lock your mobile devices
- Wipe your devices of before recycling them
- Regularly backup your mobile devices as they are more likely to be lost, damaged or stolen
- Avoid leaving mobile devices or personal documents unattended in a public place or car
- Don’t get distracted by strangers in a public place when your mobile devices are visible
- Be aware of ‘shoulder surfing’ when using your device in a public place – always check that no-ones looking over your shoulder or listening to confidential conversations
Find Out More
If your smartphone, tablet or laptop is stolen, you should do the following as soon as possible:
- Notify the police
- For phones, notify your phone service provider
- Use remote wipe if available
- Notify the Helpdesk if you use the device to access University information
- Change passwords on any accounts that may have been compromised
More information on the Physical Security of IT Equipment Policy can be found on the Information Security Policy web pages
- Student Experience & Enhancement Services
- Print Services
- Estates Services
- Finance Directorate
- Human Resources Directorate
- Procurement
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help