How to make device security in educational institutions unbreakable

by Toncy Dunlop 21, Dec, 2016

Nearly 97% of U.S. college students have a cellphone, and 79% own a laptop. That’s a lot, right? Problem is that both devices are a very attractive loot for campus thieves - 4.5 million smartphones were lost or stolen in the United States in 2013 - and who’s responsible for computer security in educational institutions? Yeah, you, the IT avenger.

So, what are you going to do about it? Sorry, calling S.H.I.E.L.D. for backup is too expensive. But there are some essential tips that you can consider to improve campus and device security. Check them out.

Laptop registration with campus safety

It could sound too obvious, but it is not. Many educational institutions in the United States still don’t have a laptop registration on campus. If you already have it, forget what we’ve said. But if you don’t… go get those serial numbers to create your own laptop database, it would be very useful for security guys to recover a stolen laptop. Trust us.

Use geofencing

One of the coolest services around if you ask me. You CAN not only monitor and identify where in the world your device is if it has been stolen, but it also allows IT avengers to determine virtual boundaries for certain devices. For example, Science unit laptops can only be used within the science campus, so if Dr. Banner tries to trespass that limit carrying an institutional laptop, an alarm and a customized safety procedure will be immediately activated (now, if you want to upset him… that’s your problem, dude!)

Install a data recovery software

Data is more essential than devices. But through institutional laptops anyone could access your strategic data, so seriously consider installing a recovery data software so you have a secure backup of all that scientific, academic, strategic and innovative information that you must protect.

Remember that great power comes with great responsibility.

Two factor authentication

Passwords are good, but not enough. Laptops should also use biometrics or signature capture, in addition to the standard name and password login, EdTech says. This could also be helpful for institutional desktop computers and printers. It works very well as a dissuasive factor, although it won’t prevent Mystique from getting your devices.

Remote blocking

Look into getting a service that can remotely block access to your stolen device: that way, even if you don't retrieve it, you'll make sure no one has access to your private stuff, even if you've shared your password with someone. And speaking of passwords, don't hold your breath, it's also possible to remotely delete any stored passwords you may have kept to log in easier.

Ok. Now you can call the big guys. Don’t forget to save a parking spot for Tony.

Protect data and devices on campus

Toncy Dunlop
Toncy Dunlop

I'm a literature graduate who found her place in the company that will help you get your lost devices back. I'm into anime, weightlifting, and reading the kind of poetry that will make me wish I wrote myself.
Let's connect:   

check out our

Related Blog Posts

10 books every IT Manager should read

by Toncy Dunlop January 16, 2017

Don't worry, I get it. Reading an actual physical book is so ten years ago. Today with the technology there could even be an..

Read More

Worst data security breaches of 2016

by Toncy Dunlop January 13, 2017

2016 was a busy year for our arch-nemesis, The Hackers. Data security and theft recovery is a serious issue. Sometimes..

Read More

5 great Chrome extensions for IT Managers

by Toncy Dunlop January 10, 2017

Chrome is the world’s most used web browser, and whether you like it or not, 73% of Internet users have it as their..

Read More

5 Great Events and Keynotes for IT Managers this 2017

by Toncy Dunlop January 5, 2017

Being an IT Professional has its ups and downs, and one of the main perks of being one is that you must always be informed..

Read More

Corporate device security: Main threats that are lurking the industry

by Toncy Dunlop December 26, 2016

Are you ready to pay a ransom for your own personal data? You better have your digital weapons prepared, because cyber..

Read More