Skip to content
Close-up of a person using a smartphone and laptop
Technology

Doomed devices: Protect hardware before it haunts you 

As part of Cybersecurity Awareness Month, ITS is sharing spine-tingling tips to keep digital information and the University’s data safe. This week’s focus is on hardware security

Close-up of a person using a smartphone and laptop

Hardware is just as vulnerable as the data stored on it. Guard your equipment as carefully as a vampire guards its coffin—or risk ending up with doomed devices. 

  • Lock your computer: An unlocked computer is like an open crypt—anyone can wander in and uncover what should stay buried. Leaving a workstation unattended, even for a moment, invites mischief. Always lock your screen before stepping away, even in trusted spaces. 
  • Don’t leave portable devices unattended: There’s no need to summon rituals when devices fit in your pocket—but that also makes them easy targets for tech goblins. Keep laptops, tablets and phones in secure locations when not in use, and out of sight to avoid tempting potential thieves. 
  • Be cautious with unknown devices: That personal USB drive or unfamiliar gadget might seem harmless, but it could put the “trick” in “trick-or-treat.” Avoid connecting devices that aren’t University approved or necessary for your work; they may contain malware or compromise sensitive information. When in doubt, leave it out. 

If you suspect a hardware security issue at MSU Denver—including a missing or compromised device—contact IT Security immediately. If a University-owned device is lost or stolen, file a police report as soon as possible. 

This article is part of MSU Denver’s Cybersecurity Awareness Month 2025 series. Find previously released tips below:  

The University is proud to support this nationwide initiative, co-led by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency (CISA) of the U.S. Department of Homeland Security