Skip to content

Some Physical Security Measures For Devices

When it comes to the security of devices, there is no length that you cannot go to in order to secure the security of your devices. In this article, I want to look at some of the physical security measures that you must consider when it comes to the security of your devices. Follow me as we are going to look at some of the measures that must be taken when it comes to the security of devices. Follow me as we are going to look at this together in this article. 

When it comes to layers of computer security, physical security happens to be the first layer of computer security. This involves the protection of hardware such as hardware, networks, and data from attacks that can cause loss or damages. 

Also, there are various factors that can affect the physical security of devices such as damage, theft, dust, fire, water, flood, earthquake among others. 
There are some facts that you need to know about Physical security. This includes the fact that:

  • Prevent any unauthorised access to computer systems. 
  • Prevent tampering/stealing of data from computer systems. 
  • Protect the integrity of data stored in a computer system.
  • Prevent the loss of data and damages to systems and against any natural calamities. 


Using locks for physical security measures…

Locks acts as the primary method of controlling the physical access of the information, information systems, and removable storage devices.
Locks provide a different level of security depending on their design and implementation. Locks are always used to: 

  • Restrict others from using a computer room. 
  • Protect the computer from unauthorised access by locking the doors and Windows on the computer premises. 
  • It also locks the CPU and Monitor in order to prevent them from being stolen. 

Another security measure that you can also use for the physical security of the device is the use of biometrics. When it comes to the use of biometrics, it involves the use of:

  • FIngerprinting 
  • Retinal scanning
  • Iris scanning
  • Vein structure recognition
  • Face recognition
  • Voice recognition

There are some physical security measures that you can take to prevent fire outbreaks. Some of these measures include: 

  • Make sure all emergency doors are kept clear
  • Use good quality wiring, tools and equipment
  • Avoid using equipment that gives a mild electrical shock
  • Keep the room dust-free and remove all scrap as possible
  • Ensure trash is emptied regularly
  • At the end of the day, always unplug the appliances
  • Make sure the user knows who to call in an emergency
  • How how to use a fire extinguisher


HVAC Considerations…

HVAC ( Heating, Ventilating, and Air Conditioning) is the technology developed for indoor environmental comfort. 
HVAC can be used for: 

  • Controlling the temperature. 
  • Adequate ventilation
  • Indoor air quality


Facts To Know About Internet Security

There are many of us that are surfing the web but we can less about our safety online. You would have seen some surfing the internet and they do not have a good anti-virus to start with. This is a very bad idea. In this article, I want to introduce you basically to what you need to know about internet security. Follow me as we will look at that together in this article. 
Internet security practice includes protecting users’ data from unauthorised access and damages that can happen when they are connected to the internet. 

Most times, when your browsers are properly configured, it can help in preventing malware infection, preventing personal information from falling into the wrong hand and limiting the damages that can happen through a cyber attack as well. 
 Also, you need to know that there are many ways that online attacks can happen. It can be through :

  • Emails
  • Instant messaging
  • Chat rooms 
  • File sharing 

On a general note, you need to be very careful when you are surfing the web or you are making use of social media platforms. You must not disclose personal information to people that you come across on social media. You also must not click on any link sent to you through social media platforms and you also have to scan all files that you have downloaded through email or social media platforms. This is due to the fact that some of these files can be used to introduce viruses to your device. 



Ways Of Securing Laptops From Thefts

I don’t know if you have ever been a victim of laptop theft, it is really a bad experience, Most times when laptops are stolen, as a tech guy, the most painful part of it is that you are going to lose your data. It might have taken a lot of years to gather all the data together. In this article, I want to show you some of the ways of securing laptops from theft. Follow me as we are going to look at that together in this article.
First and foremost, laptop theft leads to the disclosure of information such as usernames, passwords, confidential data, and other networking details related to connecting the laptop to a corporate or internet environment. 

Here are some of the things that you should do to prevent laptop thefts…


  • Note the laptop serial number and keep it safe
  • Choose a laptop skin in order to recognise it easily
  • Make sure that you report laptop theft immediately. 


Some things you should not do…

  • Do not leave the laptop unattended for a long time. 
  • Do not forget your password and avoid sharing your laptop password with others.


There are some other steps that you should take…

#1 Third Party Privacy Protection

One of the measures that you need to take is to add third party privacy protection for your sensitive data. You can actually purchase software of programs in order to make sure that unauthorised users do not have access to your sensitive data.

#2 Laptop insurance

Although this might come at an extra cost, it is always advisable for you to purchase laptop insurance. At times, when one lost his or her laptop, it might be very difficult to raise money to buy a new one. You can transfer the cost to a third party by buying PC insurance.

#3 Hardware-based security

As part of the effort to secure your laptop from theft, you have to make use of a hardware-based security device. If you have a computer room where your laptops are kept, you have to make sure that you use heavy locks. You have to also ensure that you make use of physical security when it comes to securing your devices. 

#4 Encrypt sensitive data 

Apart from having a backup of your data at all times, you have to make sure that you encrypt your sensitive data at all times. You need to make sure that all those data are encrypted. Encrypting your data will guarantee that those data are rendered useless when they fall into the wrong hard. 

#5 Set BIOS Password

Another layer of security that you can go for is to set a BIOS password. When you set a password for your BIOS, it will become extremely difficult for someone to make changes to your BIOS setting without your consent. This will assist in securing your information. It will also make it difficult for anyone to format your computer without your consent. The negative side of it is that you will lose access to your BIOS if you forget the password. 

#6 Tracking

Another way of preventing or mitigating the impact of laptop theft is to install a tracking device on your laptop. You have to make sure that these tracking tools are installed so that it will be very easy to trace the laptop when it falls into the wrong hand. With it, you can know where your laptop is at any given time. 

Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training. 

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.


Fact Check Policy

CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.


Fact Check Policy