Ask Leo! #644 – Walking Away From Your Computer

Walking Away From Your Computer


If it's not physically secure, it's not secure.

That's a phrase I've used in several articles on security, but with the recent emphasis on privacy as well, I've decided it deserves its own dedicated discussion.

You can have the best security software. You can be the greatest at identifying and avoiding phishing and other attempts to trick you into downloading malware. You can have the greatest, strongest passwords, doubly secured with two-factor authentication….

… and it's all for naught the moment someone else gets their hands on your machine.

The friends and family plan

This scenario is all too familiar.

You feel safe at home, so you don't bother locking your computer or taking other security precautions. It's just you and the people you trust, right? Be it a spouse, roommate, or a good friend over for dinner, there doesn't seem to be a reason to take special precautions.

That's exactly how I roll. If you walk into my home, there's a good chance you can walk into my office and start typing away at my desktop computer.

But I often hear from folks who shouldn't have felt quite so secure in their surroundings. Be it a friend pulling a prank by taking a photo with your phone, or a soon-to-be ex taking revenge on your online accounts, or a child just wanting to play with your shiny toy, unlimited access to the technology you have lying around isn't always the safest or most secure approach to take.

I'm fortunate in that I feel appropriately secure for my situation. What matters most is that I've thought about it on more than one occasion, rather than just assuming I'm safe or not giving it any thought at all. Usually folks who run into problems fall into that latter camp, having given little or no thought to whether they consider their home (or workplace) "safe".

I'll just be a second

I began writing this article in a local Starbucks – a place most folks consider anything but a "secure" location. Using the coffee shop's Wi-Fi through a VPN, I secured my internet connection, and my laptop never left my sight.

The gentleman next to me, on the other hand, was working on something and then … left. I didn't check to see if he was just picking up a refill or making room for more, the fact was he walked away from his open and running laptop (and a few other belongings). He returned after a couple of minutes and resumed his work.

I know if you hang out at your local coffeeshop or Wi-Fi-enabled eatery often enough, it can start to feel like home. But it's not. You might assume that the other mobile techie nearby is a "friend" who'll keep an eye on your things for a few seconds, but that's a very bad assumption. You might assume that as long as it's within eyesight, nothing bad will happen.

There are so many ways this can go wrong.

The most common result is theft. But walking away, even for a few seconds, opens the door to everything that unfettered access to your device allows.

Inspect this

Recent news has included a troubling privacy scenario many people don't foresee: inspection when crossing international borders.

Depending on where you live, where you're going, and the current political climate, any devices you take with you may be subject to inspection. That inspection could require you to provide full access to the contents of the device.

This is actually quite controversial, particularly in the U.S., and there are arguments and assumptions on both sides of the issue. What's important here is to realize that:

  • This could happen
  • It involves full access
  • It's subject to the laws of the country you are travellng to, which may be radically different than what you're used to.

It may be something most people needn't be too concerned about, but it's important to be aware of and consider this possibility before traveling.

Thieves? Yeah, but…

Many people consider theft to be the biggest thing to worry about.

If your data isn't backed up and would disappear along with your computer, that might be true. But if you've been backing up appropriately, theft is generally an inconvenience and not actually a disaster.

It's my belief that the majority of burglary and opportunistic theft is all about the hardware – not the data stored on it. Most thieves simply aren't that technically savvy, and are more interested in turning a quick profit by selling the hardware. Unless you've been specifically targeted for some reason, your data is probably not that interesting, and will likely never be noticed.

Of course, "likely" isn't never. You should still take precautions. When someone steals your equipment, they have everything on it. Depending on their level of expertise (or that of the person they sell it to), and the preparations you've made (or haven't), they could once again have access to everything.

I do take steps, some of which I'll outline below, and should anything ever be stolen, I'll be changing passwords, of course. It's just not the first thing I think of when securing my equipment.

Steps to take

When it comes to physical security, there are a variety of steps you can take, but the most important is simply to keep it mind.

Encrypt, encrypt, encrypt

In recent years, I've become a big fan of whole-disk encryption. I use it not only on any laptops I travel with, but also on my desktop computer.

Think of whole-disk encryption as password-protecting everything. Without the correct password (be it a real password, or your system log-in credentials) the information on your hard disk is simply inaccessible. As long as the machine is not running, or has been logged off, whoever has physical access to it simply can't get at anything. Period.

Particularly if you're in a situation where theft is a real concern, such as travel, whole-disk encryption is the first step to keeping your information secure. Similarly, make sure to enable encryption on any mobile devices that support it.

Important: remember that if, for some reason, you can't log in to your own machine (or forget the password) you, too, will be unable to access the data contained on the disk. It's critical you have a separate backup, kept secure in some other fashion. Make sure also to take advantage of any backup options, like a recovery key, offered by the encryption technology you use.

Log out

Yes, having to log in to your machine is an inconvenience. But by not having a login, you've made it a trivial matter for anyone to walk up to your computer at any time and access its contents, running or not.

Minimally, make sure a password is required to access your computer, and use a screen saver that also requires a password be specified to regain access after some period of inactivity.

Similarly, make sure your mobile device has a PIN code1. Configure an appropriate time-out, after which the device requires the code to access the device's contents.

For bonus points, consider getting into the habit of locking your computer or device when you walk away (keyboard shortcut: Windows key + L).

Take your laptop when you pee

I'll be blunt: if I'm at the coffee shop and need to use the restroom, my laptop comes with me. I do not trust it away from my sight. Honestly, even walking a couple of dozen feet away to get sweetener for my coffee makes me uncomfortable, even though the device is within eyesight.

This is true for any public place you take and use your devices, including airports, libraries, and schools. It even applies when at the home of your latest new acquaintance or friend-of-a-friend. At a minimum, make sure the device is locked if you do walk away.

Lock the doors

I hear fairly regularly from individuals who've had their information compromised by their roommates or roommates' friends. In situations like this, one of the most common solutions is to lock your device.

Not with software (though that's good too) – with hardware.

Get a lock for the room containing your computer, or find some other form of physical security to prevent access or theft.

Make travel plans

Travel can be complex, depending on where you're going and what you need to take with you.

At one extreme, the Electronic Frontier Foundation has some ideas for individuals traveling internationally that could include traveling with only pristine devices that contain no sensitive data whatsoever, and relying on cloud access for the information you need.

At a more practical level, the single most important thing you can do is plan for your device(s) to be lost. Not only is losing a device when traveling frighteningly common, preparing for the possibility also readies you for theft. Encrypting, backing up, logging out, and simply making a habit of all the items I've discussed above are key to traveling safely and keeping our digital lives secure.

There are times – intentionally or otherwise – where our devices will be out of our control and potentially even in someone else's hands. It's at those times it's important to remember the most basic rule of all:

If it's not physically secure, it's not secure.

Related Links & Comments: Walking Away From Your Computer

Become a Patron - Get The Ask Leo! Tip of the Day

Why is My Screensaver Asking for a Password, and How Do I Fix That?

I've been using a screen saver for years. I used to be able to just move my mouse and get back to my desktop. However, now when I move my mouse, it takes me back to the ‘Welcome Screen' and I have to enter my password again. How do I undo that?

It's easy to fix, but it's also an important aspect of security.

First I'll make an argument for not changing it.

Then I'll show you how.

Continue Reading: Why is My Screensaver Asking for a Password, and How Do I Fix That?

How Do I Make the Taskbar Smaller or Larger?

How to reduce the size of the strip at the bottom of the Windows desktop window?

That "strip", as you call it, is the Windows taskbar.

Most folks don't realize it's really a special window, of sorts. And as a window, you can resize or even move it.

Sometimes people are even surprised when that happens by accident.

Continue Reading: How Do I Make the Taskbar Smaller or Larger?

The Ask Leo! Tip of the Day

A feature exclusively available to Ask Leo! Patrons.

More Ask Leo!

Become a Patron
Books - Business - Glossary
Facebook - YouTube - More..

Leo's Other Projects....

HeroicStories Since 1999, HeroicStories brings diverse, international voices to the world ' reminding us that people are good, that individuals and individual action matter. Stories - new and old - are published twice a week.

Not All News Is Bad - Each day I look for one story in the current news of the day with a positive bent. Just one. And I share it. - My personal blog. Part writing exercise, part ranting platform, it's where I write about anything and everything and nothing at all.

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at for their own FREE subscription!

Newsletter contents Copyright © 2017,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC

Posted: March 21, 2017 in: 2017
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.

My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.