This page has been open since ..., for a total of 0 seconds.
This is the ... time this computer has been found unlocked, for a total of ....
In that time, here's a glimpse of what a malicious actor could have done on your computer:
An unlocked screen doesn't just expose your files โ it hands over your entire authenticated identity. Every session, every credential, every connected service is wide open. An attacker doesn't need your password. They already have it โ because you are already logged in. In just minutes, someone could:
The consequences range from personal embarrassment to a data breach with serious legal and financial fallout. The good news: preventing all of this takes exactly two seconds.
Locking your screen is quick and should be a habit every time you step away. Here are the keyboard shortcuts for major operating systems:
Press Windows Key + L
Press Control + Command + Q
Press Super Key + L
(The Super Key is usually the Windows key. This shortcut is common on environments like GNOME/Ubuntu. Others may use Ctrl+Alt+L.)These are not hypothetical risks. Unlocked and unattended workstations have been directly cited in regulatory enforcement actions, criminal investigations, and multi-million dollar settlements.
The HIPAA Security Rule's Workstation Security standard (45 CFR ยง164.310(c)) explicitly requires covered entities to implement physical safeguards preventing unauthorized access to workstations containing patient data. The HHS Office for Civil Rights (OCR) regularly cites unattended and unsecured workstations in enforcement actions. In 2019, the University of Rochester Medical Center paid a $3 million settlement with the OCR following investigations that included repeated failures to secure devices and workstations containing protected health information. HIPAA penalties can reach up to $1.9 million per violation category per year.
Read the URMC Resolution Agreement โThe FBI's Internet Crime Complaint Center (IC3) 2023 Annual Report recorded over $2.9 billion in BEC losses โ making it the costliest cybercrime category for the fourth consecutive year. An unlocked workstation with an active email session is uniquely dangerous compared to a phished account: the attacker has a live, already-authenticated session, meaning MFA is completely bypassed. They can send emails, modify mail forwarding rules, impersonate executives, and approve financial transactions โ without triggering a single security alert.
Read the FBI IC3 2023 Annual Report โThe 2023 Ponemon Institute Cost of Insider Threats Global Report found that insider-related incidents cost organizations an average of $16.2 million per year. An unlocked screen is the simplest form of insider threat: it requires no hacking tools, no stolen credentials, and leaves minimal forensic traces. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) notes that insiders โ and opportunistic bystanders โ can exploit authorized access to steal data, install backdoors, or sabotage systems. The attacker doesn't need to "break in" if the door is already open.
Learn about Insider Threats via CISA โUnder GDPR (EU), CCPA (California), and most modern data protection regulations, organizations have a legal duty to prevent unauthorized access to personal data through reasonable security measures โ including workstation controls. A breach that begins with an unlocked, unattended computer can trigger mandatory breach notification obligations, regulatory investigations, and significant fines. Under GDPR Article 32 alone, penalties can reach โฌ20 million or 4% of global annual turnover โ whichever is greater.
Read GDPR Article 32 โ Security of Processing โA single unlocked screen can be the starting point for a breach that costs millions, destroys customer trust, and ends careers. Two seconds to lock your screen is worth it.
Found a coworker's or friend's computer unlocked? You can teach them this important lesson in a harmless and memorable way. It's simple:
It's a friendly prank that reinforces a critical security habit. By "YLYSU-ing" your colleagues, you help make everyone, and the entire organization, more secure.