How Important is Security on your Kiosk Software?

Tips from the insider | 14 Oct 2011

Security lock kioskWhen operating in a public location it’s vital to ensure that your kiosks are securely locked down. Failure to do so could cause serious problems as users exploit weaknesses in your kiosk software and pass on their findings to others via the web. The knock-on effect could severely damage your business. Along-side vandalism and system errors, security issues rank as one of the top issues effecting up-time across large kiosk estates.

Read on for some tips on keeping your kiosks safe….

  • Replace the Windows interface with a purpose-built skin, which blocks access to Windows Explorer, local drives, desktop, taskbar, system files…
  • Use a secure browser that prevents access to menu items that the user can tweak
  • Block unauthorised downloads or perhaps limit the download location to a USB drive
  • Use a white list to restrict what sites your users can access
  • Disable shortcuts such as CTRL+ALT+DEL, Windows key, CTRL-ESC, F10. (Must be disabled from the moment the machine powers up)
  • The kiosk software must run via a limited Windows account to ensure maximum security is provided, this ensures critical system files cannot be erased
  • Hide system drives, make sure the user can only see the drives they need
  • Choose kiosk software that allows you to set folder access rights. (Full, Read-only, Read/Write, Read/Execute, None…)
  • Block unauthorised applications and program options, make sure Open, Save as, Properties etc are managed properly
  • Force applications and processes to remain running so that services are always available and the user experience isn’t interrupted
  • Create an Engineer Login that de-activates the shell and allows technicians to perform system updates or configuration changes
  • Protect user confidentiality by ensuring that the kiosk software automatically times sessions out and deletes browser cache, history and visited pages. Prevent cookies from saving customer identity and usage


Comments are closed.