Your physical gateway to digital security Emergency Protocol  ·  Why This Works
  60-SEC FIX

Someone Has Physical Access to Your Laptop RIGHT NOW?

Do these 5 things. In order. Right now.

60-second read · 5 actions

Follow these in order. Do not skip steps.

01

Lock your screen immediately.

Press Win+L (Windows) or Cmd+Control+Q (Mac) right now. Every second your screen is visible, someone can photograph your data, read your emails, or see saved passwords. Do this before reading step 2.

02

Remove every USB device you didn't plug in.

Unplug any USB drive, adapter, or dongle you don't recognize. USB rubber ducky attacks execute malicious commands in seconds. If you find an unknown device, do not plug it back in — bag it as evidence. Check every port, including hidden ones on docking stations.

03

Enable your privacy screen or angle your display away.

If you have a physical privacy filter, verify it's seated. If not, tilt your screen down 15–20 degrees and move to face a wall. Shoulder surfing in offices, coffee shops, and airports captures more credentials than phishing — Verizon's 2024 DBIR confirmed physical access vectors in 14% of breaches.

04

Check for unauthorized Bluetooth connections.

Open Bluetooth settings and review paired devices. Remove anything you don't recognize. Attackers use Bluetooth keyloggers and proximity-based exploits to capture keystrokes wirelessly. If your laptop was unattended, assume Bluetooth was probed.

05

Run a quick audit of recent login activity.

Open your browser, go to your Google or Microsoft account security page, and check "Recent security activity" and active sessions. Look for logins from unfamiliar locations or devices in the last hour. Sign out anything suspicious immediately and change that account's password from a different device.


  You're stabilized. Here's why that worked.

Why These 5 Steps Stop Physical Attacks

Screen locking is the single most effective physical security action. The Verizon Data Breach Investigations Report consistently finds that physical access — someone simply walking up to an unlocked device — accounts for a significant percentage of corporate breaches. A locked screen with a strong PIN or password is a hard stop. No exploit bypasses it without advanced tools.

USB attacks are not theoretical. Devices like the USB Rubber Ducky ($50 online) emulate a keyboard and type malicious commands at superhuman speed — opening terminals, downloading payloads, and exfiltrating data in under 10 seconds. The 2022 Colonial Pipeline attack began with a compromised credential, but USB-delivered malware remains a top physical vector. Removing unknown devices eliminates this entirely.

Privacy screens work by limiting the viewing angle to roughly 60 degrees — anyone more than 30 degrees off-center sees a dark screen. A Carnegie Mellon study found that shoulder surfing succeeds in capturing sensitive data 73% of the time in public spaces without privacy filters. Even angling your screen away reduces the attack surface by roughly half.

Bluetooth exploitation has evolved beyond simple eavesdropping. Attacks like BlueBorne (CVE-2017-0781) can compromise a device without pairing. KeySniffer captures keystrokes from wireless keyboards. Reviewing and pruning paired devices removes dormant backdoors that an attacker may have established during an unattended window.

Login activity audits catch what the other four steps might miss. If someone accessed your email, cloud storage, or social media during an unattended period, active sessions will show it. Google's security dashboard and Microsoft's account activity page show IP addresses, device types, and timestamps. Signing out suspicious sessions and rotating credentials is the final lockdown.

Get Emergency Protocols in Your Inbox

One email per week from Sarah. Physical security, device lockdowns, and the protocols you need before the breach happens.

Join 2,400+ secured readers · No spam · Unsubscribe anytime

You're in. Check your inbox for the first protocol.