Locking Your Unattended Enterprise Laptop and Desktop

Modified on Wed, 26 Jul, 2023 at 8:59 AM

    Maintaining robust security measures for enterprise workstations is crucial to safeguard sensitive data and protect against unauthorized access. In this knowledgebase article, we will outline a common security behavior that promote a secure workstation environment. By implementing this practice, organizations can significantly reduce the risk of data breaches and unauthorized use of corporate resources while its user is away from the device.


Locking Your Workstation:

    One of the simplest yet essential security habits is locking workstations when employees step away from their desks. This practice ensures that unauthorized individuals cannot access or manipulate sensitive information. To lock a workstation, follow these steps:


  • Windows: Press the "Windows Key + L" simultaneously or use the "Ctrl + Alt + Del" shortcut and select "Lock."
  • macOS: Press "Ctrl + Command + Q" or use the fast user switching menu from the top-right corner and select "Login Window."



    This does not log you out of your computer's session. Instead, it shows a challenge for your password if you want to continue using your computer. This way details on your computer's screen are not easily seen by others while you're away, and it also prevents your login from being used by somebody who has walked up to your unattended computer without your knowledge or consent.


Conclusion:

    Establishing and promoting effective security behaviors, habits, and policies is vital for maintaining a secure enterprise workstation environment. By implementing measures such as locking workstations, enforcing strong passwords, regular software updates, multi-factor authentication, restricting administrative privileges, safe browsing practices, and security awareness training, organizations can significantly reduce the risk of security breaches and protect valuable corporate assets.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article