Computers and Laptops physical security can be accomplished in different ways. Especially in ISO 27001 the physical security of the IT infrastructure is required. Locking the laptops and computers are one part of the physical security. We can use Kensington locks in order to lock our computers and laptops into a specific location and place.
Kensington lock is first invented in 1992. It is the primary use case was locking laptops but during the time it became so popular and created different Kensington locks. Kensington locks are important because
- 39% of the data breaches caused by lost or stolen devices
- The laptop theft can be reduced by 85% if physical security is implemented properly
- Kensington lock is compatible with the 90% of the business devices
Kensington Lock Types
There is a different type of Kensington locks which are used different use cases. Simply there are 3 main types like
- Traditional Locks used to traditional use cases
- Next-Generation Locks are used for newer and latest use cases
- Industry Locks are mainly enterprise and industrial level use cases
Keyed locks provide durability, flexibility, and compatibility with most of the computers and laptops. Keys are used to locking and unlocking the Kensington locks.
Combination locks provide professional-grade strength and security by using a combination for locking and unlocking the Kensington locks.
Desktop Locking Solutions
Desktop locking solutions are designed to secure devices and peripherals to desktops. Keys are used to locking and unlocking the Kensington locks.
Lock Anchor Points & Accessories
By using lock anchor points we can create points to use Kensington keys.
Next Generation Locks
Next-generation locks provide more convenient locks for the new type of laptops like an ultrabook, tablets, etc.
Thin& Light Laptop Locks
As laptops advances, their size and forms change. The new type of laptops and tablets can be locked by using Kensington locks.
Surface locks can be useful especially in tablets.
Kensington can also use Two-Factor Authentication (2FA). Where the user can use fingerprint and password to unlock the computer or laptop.
USB Port Locks
USB port locks will be plugged into the USB port and can not be removed from others without using the key. This will prevent the USB connection to the laptop and computer.