(405) 919-9901

In securing the computers of the small or home office, it is important to consider the physical security of the machines themselves, as there are many threats that do not come from the Internet, but, rather, come from someone having physical access.

If there is any chance that your computer may be left unattended in an area where it can be physically accessed by an unauthorized person, you should password-protect the startup (or “logon”) screen.  This way, your operating system (OS) will not allow access inside without a user name and password.  You’ll also want to set the system to log you off or go into a password-protected screensaver mode after a certain period of inactivity.  These measures can prevent someone from copying or changing files (or worse) behind your back.

A favorite trick of bad guys who have access to unsecured computers is to insert a CD or floppy disk full of “burglar” tools, and restart the machine, having it “boot” to the CD or floppy, rather than the normal operating system.  Done correctly, this trick can allow them to bypass a password-protected OS.  Once done, they can access all of the machine’s files, and also insert “back door” programs, which can be used to remotely control a computer over a network, or even over the Internet.  To help prevent this scenario, you should set the BIOS (basic input/output system) to boot only to the hard drive, and you should also password-protect the BIOS, so your settings cannot be changed without your password.  Password-protected access is especially vital to owners of laptop computers containing sensitive information that may fall into “enemy” hands.

I am often asked to rescue files from a computer that has an otherwise wrecked OS.  This can be done by removing the computer’s hard drive, installing it in another machine, “mounting” the hard drive with the good computer’s OS, and copying the files to be rescued.  This trick also works for bad guys who steal computers, and then discover that the BIOS and/or OS are password-protected.  To further guard their files, astute computer owners will use a protection scheme called encryption, which will turn the contents of their files into a secret code which can only be decrypted by those who have a secret password or key.  Encryption is considered by many to be the best form of data security.

Don’t neglect to consider the obvious.  Are office doors, desks and cabinets locked?  Could a bad guy simply walk into your office and walk out with a computer?  Many companies make specialty cases, cables and locks, which can prevent computer “shoplifting.”  Are your CDs and floppy disks secured?  If your computer breaks down, do you have backup copies of your files?  What if there were a fire or other disaster that destroyed your computer files?  Do you have backups in a secure setting, or would such a disaster also destroy your business?  Protect your future by physically protecting your computers.