Basic IT Controls

Control Points

  • Information technology equipment (such as laptops, projectors, and thumb drives) should be physically secured to prevent theft.
  • System passwords should not be shared with coworkers (or anyone else), and, if necessary, should only be stored in secure locations.
  • Access to sensitive data should be prevented by securing your computer when not in use; this can be accomplished by locking your desktop when you get up.
  • Employees should ensure that they adequately protect information technology equipment when it is in their possession.