Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Free Training Tool for Unlocked Computers
Published:
October 4, 2021

Free Training Tool for Unlocked Computers

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

__wf_reserved_inherit

What do you do when you find an unlocked computer in your office? Does it make you cringe? Have you ever been to a coffee shop, conference, or even walking around your office to see a random computer sitting there completely unlocked while unattended? Depending on your position, you may not even notice, but hopefully after today you will keep your eyes peeled. We are going to talk about what led our team to creating UnlockedComputer.com and how you can use this free tool from Huntress to help educate your employees about the risk of leaving their computers unlocked.

What led us to launching this free tool?

A few months a question on LinkedIn was posted asking what companies currently do when they find an employee’s computer unlocked. The question was more about how do companies educate their employees about not leaving their computers unlocked. Hundreds of thousands of views and comments from around the world came in, and we didn’t really see an answer we loved. It was starting to become apparent that the community doesn’t have a great answer to helping their employees lock their computers.

What were the answers?

__wf_reserved_inherit

David Hasselhoff was hands down the most popular answer. The Hoff was just flat out replaced as the desktop background image. When people see an unlocked computer, there is some type of magnetic pull that leads them to putting a picture of David Hasselhoff on the desktop. Don’t get me wrong, a memorable picture of the Hoff clearly has made an impact on its victims. I still don’t really know why he has become the worldwide star of this phenomena, but this is the reality we live in today. But what else was out there to help change behavior of leaving computers unlocked? Other responses to the question included, "I slam the clean desk policy back in their face.” Some said due to corporate rules, an employee can’t touch another employee’s laptop. This is definitely an interesting legal approach to securing accounts, but we still didn’t see an answer to help educate the employee. We also ran across companies that would encourage sending a public email out to the entire staff from that employee’s email account. The email would say something like “I am writing this to let you know that I left my computer unlocked and I didn’t send this email.” A bit aggressive, but apparently it got the point across very quickly on why you shouldn’t leave your computer unlocked. This didn’t resonate well with employees and created quite a bit of resentment amongst the employees. We did see a positive answer to enforce locking computers with technical controls through Active Directory or other device management services. This is a great start and definitely puts some guardrails up for employees. Personally, I setup hot corners on my computer. It’s become instinctual to throw the lock screen up, even when I am working at home by myself. I know others that do the same, it has become a habit to lock their computers. It is actually hard not to lock the computer and for some people, it feels like something is missing if they don’t. We knew that we could help promote locking computers around the world, but we needed a creative way that can help everyone in that mission.

How we are going to help?

Huntress spent some time after this initial research to continue to find out how others are dealing with the issue of unlocked computers internally. The answers were still clearly not there. People from all over the world responded with the same old boring approaches that we already heard. Pointing back to the policies, booking a 1-hour mandatory remedial training discussion (sounds horrible), signing them up for more Death by PowerPoint sessions in their LMS, and otherwise doing nothing. With today’s fascination behind running endless phishing tests, we wanted to prove that a security awareness program should do more. A powerful security awareness training program should be designed to build a culture with your employees. We launched UnlockedComputer.com to do just that. Anyone can use this tool to help educate people on why they should lock their computers. The moment is brought to life with one of our favorite beloved characters DeeDee. DeeDee is a villain in the Curriculaville universe that uses all types of tactics to hack her victims, even if it’s just for concert tickets. DeeDee even brings our phishing simulator full circle and keeps employees on their toes with her simulated phishing tests. So stop making DeeDee’s job easy as a hacker, and lock your computers! We even include a few training steps that can help guide employees how to lock their own computer on a Windows machine or a Mac.

__wf_reserved_inherit

IT Admins and employees (with permission of course) can simply display unlockedcomputer.com on the web browser for the device that was left unattended. This will display a simple training page that will showcase DeeDee and help employees learn why and how they can lock their computers. Enjoy and if you have a ton of complex legal rules at your company, don’t worry you don’t need to use this tool! Our team just wanted to make a simple and fun option for everyone to educate their employees about securing their devices and keeping them locked when unattended. UnlockedComputer.com

Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy