SlideShare a Scribd company logo
1 of 111
Laptop physical security  A scary but helpful guide for IT managers  In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer  	That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
This dismal scenario is extremely common. Around 90% of organisations are affected
Laptop TheftQ. Has your organisation, or any of your employees, experienced laptop theft or loss
The top seven excuses your colleagues will use are:  We were burgled
The top seven excuses your colleagues will use are:  2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
The top seven excuses your colleagues will use are:  		3. I was only away for a minute
The top seven excuses your colleagues will use are:  4. I left it in the car
The top seven excuses your colleagues will use are:  5. I thought it would be safe
The top seven excuses your colleagues will use are:  	6. I asked the person next to me to watch my stuff –  he looked really trustworthy
The top seven excuses your colleagues will use are:  	7. It was on my desk – then it was gone
Most theft is  Opportunistic Once reformatted, stolen laptops are difficult to spot  Most laptops - 58% - are stolen from work Thieves usually steal laptops for their resale value rather than for the data Laptops are easy to sell anonymously over the internet
IDC research shows that the office is the most likely place for a thief to strike
Where your laptops WILL BE stolen from:
86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen  56% report that it resulted in a data breach
59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
52% of business managers sometimes or often leave their laptop with a stranger when travelling
1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
89% of companies experience laptop loss
It takes average of 9 days to get fully operational after laptop loss
The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
Business problems you can avoid by using laptop locks  Loss of  reputation
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  		Risk of industrial  			espionage
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage Reduce the likelihood  			of identity theft
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage  		Reduce the likelihood of identity theft  Losing customers
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage  Reduce the likelihood of identity theft  Losing customers  Having to tell your customer you lost their data because you were careless
Theft PreventionQ. What proportion of laptop theft do you believe would not have occurred if a cable lock had been used?
The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft is $47,000 for larger organisations  – some of which can have over 1,000 laptops..
IDC suggests that organisations typically underestimate the cost of laptop theft by over 30% particularly the cost of downtime
And remember you’ll only ever get  3%  of the lost or stolen laptops back
7 common misconceptions  1. Encryption is the way forward
1. Encryption is the way forward.  Company policies now routinely stipulate that any data leaving an office must be encrypted  Around 50% of executives turn off encryption on their laptops if they can Encryption can never stop someone walking off with a laptop
7 common misconceptions  2. Better door security in the office is the  answer
	2. Better door security in the office is the answer  	Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter  	Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
7 common misconceptions  3. It won’t happen to me or my employees
	3. It won’t happen to me or my employees A typical business laptop lasts for 3.1 years 	Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
7 common misconceptions  4. I can recover the data
	4. I can recover the data.  	On average it will take you nine days to replace a laptop – so you’ll certainly have time to try  35% of companies have never tried to successfully restore from their back up, so it might not work at all
7 common misconceptions  		5. Cable locks are ugly and fiddly
	5. Cable locks are ugly and fiddly...  	Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
7 common misconceptions  6. Nobody like using laptop locks
	6. Nobody like using laptop locks. 	Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
7 common misconceptions  7. My employees simply won’t use laptop locks
	7. My employees simply won’t use laptop locks.  	They certainly will if you make the consequences of not using them serious enough 	Introducing cultural change into any organisation can take effort, but there’s a tipping point after which it becomes more natural to embrace the change than to fight it
How to prevent laptop theft  Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves A laptop lock is the front line of defence
How to prevent laptop theft  Add a clause to your HR or company policy to give people the right incentive to use a lock
How to prevent laptop theft  	Give colleagues brief training in theft awareness when you hand them out a lock
How to prevent laptop theft  	Ask employees not to leave their laptops in unattended cars
How to prevent laptop theft  	Insist and make it a disciplinary matter – your business and reputation is certainly worth it
How to prevent laptop theft  Tell employees to use a lock when they are  o At home
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office  o In a coffee shop
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office  o In a coffee shop  o At a conference or training course
What to do if your laptop does get stolen  Think of a great excuse (because there is no justifiable reason)
What to do if your laptop does get stolen  Tellyour boss and then take one step back and wait for the answer
What to do if your laptop does get stolen  TellIT and then take one step back and wait for the answer
What to do if your laptop does get stolen  Tell your customers and then take one step back and wait for the answer
What to do if your laptop does get stolen  Tell your shareholders and then take one step back and wait for the answer
What to do if your laptop does get stolen  Report it to the police (you’ll be amongst others who made the same mistake)
What to do if your laptop does get stolen  For some of you – start looking for a new job
What to do if your laptop does get stolen  For some of you – change all your passwords
What to do if your laptop does get stolen  Ask friends for photos they may have as copies of the ones you just lost
What to do if your laptop does get stolen  Feign insanity
What to do if your laptop does get stolen  Beg IT to get you another one fast
What to do if your laptop does get stolen  Start rewriting the urgent report you just lost
What to do if your laptop does get stolen  Request an expense authorisation for a new laptop
General  Don't leave laptops unattended and always lock
General  Don't allow anyone else to use your laptop — it is company equipment and provides access to our networks
General  If left at work overnight, lock out of sight
General  Choose an ordinary looking briefcase or non-traditional laptop carry bag Bags that obviously contain computers are an easily identifiable target for the casual thief
At Home  Always store inside your home, never leave in the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard or strong drawer
At Home  When it is not possible to lock away, use your supplied T-bar lock attaching to either an immoveable object or to something that is difficult or heavy to carry
At Home  Do not allow any use that is not authorised by The Company
At Home  Onlyconnect to approved or known wireless networks Ideally use your encrypted domestic connection if available
In the Car  Your laptop will be safer if it is not left in the car at all
In the Car  If absolutely necessary, lock out of sight in the boot
In the Car  If you expect to leave your laptop in the car regularly, speak to the helpdesk and ask about additional security measures  ,[object Object],[object Object]
In the Car  While the vehicle is in motion, your laptop should be stored in its carry bag  ,[object Object],[object Object]
Public Transport and Public Places.  Laptops are particularly vulnerable to theft and loss while using public transport
Public Transport and Public Places.  Do not use your laptop while travelling unless necessary
Public Transport and Public Places.  Never leave unattended and never allow anyone else to use your laptop
Public Transport and Public Places.  Be aware of your surroundings  ,[object Object],[object Object]
Public Transport and Public Places.  Only connect to approved or known wireless networks
Hotels, Conference and Meeting Rooms  Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
Hotels, Conference and Meeting Rooms  In conference and meeting rooms, use your T-bar lock
Data Protection Responsibilities  Always use encryption software approved and supplied by The Company
Data Protection Responsibilities  Choose a password that is unique to your data-encryption key; make it long, random and complicated to guess
Data Protection Responsibilities  Do not give your network password or token/access device to anyone ,[object Object],[object Object]
Data Protection Responsibilities  Your laptop is the property of The Company; do not lend it to anyone
Data Protection Responsibilities  If you leave your laptop switched on and unattended you must activate the password-protected screensaver ,[object Object],[object Object]
Malware Responsibilities  The Company provides all laptop users with pre-installed antivirus software Make sure you know how to access and use this software. Call the helpdesk for advice if needed
Malware Responsibilities  If you do not have regular access to The Company's network then you will not receive regular antivirus updates Make sure you log on to the company network at least once a week
Malware Responsibilities  Always scan files for viruses Your email is automatically scanned for you as are files from the company network If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
Malware Responsibilities  Do not open any email attachments unless they were expected and from a trusted source Email attachments are the number-one malware risk
Malware Responsibilities  Do not download any software. If you need a different or more current application, contact the helpdesk for advice Most permitted applications are updated automatically for you when you log into the company network
Malware Responsibilities  If you suspect a virus attack, contact the helpdesk immediately Do not access the company network or back up files until your laptop has been inspected
1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
Sources  *http://intel.ly/mkvRrl  **http://bit.ly/jN3RHl  http://clicksafe.kensington.com/laptop-physical-security-a-scary-but-helpful-guide-for-it-managers/ http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
Image credit Slide 3 http://skincitysl.com/ Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html Slide 6: http://triutami1359.blogspot.com/ Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/ Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/ Slide 9: http://themensgiftguide.com/blog/?p=355 Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/ Slide 11: http://www.hodson-office.co.uk/ Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/ Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/ Slide 19: http://www.singlesolution.com/blog/page/2/ Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6 Slide 22: http://www.justcalendar.org/calendar/calendar.jpg Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/ Slide 24: http://www.pspsps.tv/2008/06/ Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/ Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/ Slide 28: http://uk.askmen.com/money/keywords/espionage.html Slide 29: http://www.americanbadbusinesslist.com/identity-theft/ Slide 30: http://www.uktranslation.co.uk/ Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/ Slide 42: http://www.recover-lost-data.co.uk/ Slide 44: http://www.vibrant.com/cable-messes.php Slide 48: http://inchatatime.blogspot.com/2007_11_01_archive.html Slide 52: http://speechempoweredcomputing.co.uk/Newsletter/ Slide 53: http://news.bbc.co.uk/1/hi/8220274.stm Slides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.html Slides 81- 86:  http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=Keywords Slides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/ Slides 101-107: http://www.malware-help.com/ Slide 95- 100:  http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx
Laptop physical security
Laptop physical security
Laptop physical security
Laptop physical security
Laptop physical security

More Related Content

What's hot

Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insidersgjohansen
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides SlideTeam
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)Abolade Lekan
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 

What's hot (20)

Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Types of telecom fraud
Types of telecom fraudTypes of telecom fraud
Types of telecom fraud
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Internet safety
Internet safety Internet safety
Internet safety
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 

Viewers also liked

A guide to using iPads in the classroom
A guide to using iPads in the classroomA guide to using iPads in the classroom
A guide to using iPads in the classroomLapSafe Products
 
A guide to ICT security in schools
A guide to ICT security in schoolsA guide to ICT security in schools
A guide to ICT security in schoolsLapSafe Products
 
Campus Laptop Security 2010
Campus Laptop Security 2010Campus Laptop Security 2010
Campus Laptop Security 2010stoptheft
 
A guide to games-based learning
A guide to games-based learningA guide to games-based learning
A guide to games-based learningLapSafe Products
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorLapSafe Products
 
A guide to simple school science experiments
A guide to simple school science experiments A guide to simple school science experiments
A guide to simple school science experiments LapSafe Products
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 

Viewers also liked (8)

Laptop theft statistics
Laptop theft statisticsLaptop theft statistics
Laptop theft statistics
 
A guide to using iPads in the classroom
A guide to using iPads in the classroomA guide to using iPads in the classroom
A guide to using iPads in the classroom
 
A guide to ICT security in schools
A guide to ICT security in schoolsA guide to ICT security in schools
A guide to ICT security in schools
 
Campus Laptop Security 2010
Campus Laptop Security 2010Campus Laptop Security 2010
Campus Laptop Security 2010
 
A guide to games-based learning
A guide to games-based learningA guide to games-based learning
A guide to games-based learning
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public Sector
 
A guide to simple school science experiments
A guide to simple school science experiments A guide to simple school science experiments
A guide to simple school science experiments
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 

Similar to Laptop physical security

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer SecureNiall Roche
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
What does Glen Tupling do?
What does Glen Tupling do?What does Glen Tupling do?
What does Glen Tupling do?gtupling
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminAntonio Sanz Alcober
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And SecureRob Clement
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech SupportHoward Page
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Ron Pierce
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 

Similar to Laptop physical security (20)

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer Secure
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
What does Glen Tupling do?
What does Glen Tupling do?What does Glen Tupling do?
What does Glen Tupling do?
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech Support
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 

Recently uploaded

9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gapedkojalkojal131
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...Pooja Nehwal
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurSuhani Kapoor
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...srsj9000
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...ur8mqw8e
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一zul5vf0pq
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsappssapnasaifi408
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...Call Girls in Nagpur High Profile
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service ThanePooja Nehwal
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查awo24iot
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 

Recently uploaded (20)

young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
 
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
 
Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 

Laptop physical security

  • 1. Laptop physical security A scary but helpful guide for IT managers In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
  • 2. Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
  • 3. This dismal scenario is extremely common. Around 90% of organisations are affected
  • 4. Laptop TheftQ. Has your organisation, or any of your employees, experienced laptop theft or loss
  • 5. The top seven excuses your colleagues will use are: We were burgled
  • 6. The top seven excuses your colleagues will use are: 2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
  • 7. The top seven excuses your colleagues will use are: 3. I was only away for a minute
  • 8. The top seven excuses your colleagues will use are: 4. I left it in the car
  • 9. The top seven excuses your colleagues will use are: 5. I thought it would be safe
  • 10. The top seven excuses your colleagues will use are: 6. I asked the person next to me to watch my stuff – he looked really trustworthy
  • 11. The top seven excuses your colleagues will use are: 7. It was on my desk – then it was gone
  • 12. Most theft is Opportunistic Once reformatted, stolen laptops are difficult to spot Most laptops - 58% - are stolen from work Thieves usually steal laptops for their resale value rather than for the data Laptops are easy to sell anonymously over the internet
  • 13. IDC research shows that the office is the most likely place for a thief to strike
  • 14. Where your laptops WILL BE stolen from:
  • 15. 86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen 56% report that it resulted in a data breach
  • 16. 59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
  • 17. 65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
  • 18. 50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
  • 19. 52% of business managers sometimes or often leave their laptop with a stranger when travelling
  • 20. 1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
  • 21. 89% of companies experience laptop loss
  • 22. It takes average of 9 days to get fully operational after laptop loss
  • 23. The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
  • 24. Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
  • 25. Business problems you can avoid by using laptop locks Loss of reputation
  • 26. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”
  • 27. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body
  • 28. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage
  • 29. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft
  • 30. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft Losing customers
  • 31. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft Losing customers Having to tell your customer you lost their data because you were careless
  • 32. Theft PreventionQ. What proportion of laptop theft do you believe would not have occurred if a cable lock had been used?
  • 33. The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft is $47,000 for larger organisations – some of which can have over 1,000 laptops..
  • 34. IDC suggests that organisations typically underestimate the cost of laptop theft by over 30% particularly the cost of downtime
  • 35. And remember you’ll only ever get 3% of the lost or stolen laptops back
  • 36. 7 common misconceptions 1. Encryption is the way forward
  • 37. 1. Encryption is the way forward. Company policies now routinely stipulate that any data leaving an office must be encrypted Around 50% of executives turn off encryption on their laptops if they can Encryption can never stop someone walking off with a laptop
  • 38. 7 common misconceptions 2. Better door security in the office is the answer
  • 39. 2. Better door security in the office is the answer Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
  • 40. 7 common misconceptions 3. It won’t happen to me or my employees
  • 41. 3. It won’t happen to me or my employees A typical business laptop lasts for 3.1 years Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
  • 42. 7 common misconceptions 4. I can recover the data
  • 43. 4. I can recover the data. On average it will take you nine days to replace a laptop – so you’ll certainly have time to try 35% of companies have never tried to successfully restore from their back up, so it might not work at all
  • 44. 7 common misconceptions 5. Cable locks are ugly and fiddly
  • 45. 5. Cable locks are ugly and fiddly... Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
  • 46. 7 common misconceptions 6. Nobody like using laptop locks
  • 47. 6. Nobody like using laptop locks. Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
  • 48. 7 common misconceptions 7. My employees simply won’t use laptop locks
  • 49. 7. My employees simply won’t use laptop locks. They certainly will if you make the consequences of not using them serious enough Introducing cultural change into any organisation can take effort, but there’s a tipping point after which it becomes more natural to embrace the change than to fight it
  • 50. How to prevent laptop theft Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves A laptop lock is the front line of defence
  • 51. How to prevent laptop theft Add a clause to your HR or company policy to give people the right incentive to use a lock
  • 52. How to prevent laptop theft Give colleagues brief training in theft awareness when you hand them out a lock
  • 53. How to prevent laptop theft Ask employees not to leave their laptops in unattended cars
  • 54. How to prevent laptop theft Insist and make it a disciplinary matter – your business and reputation is certainly worth it
  • 55. How to prevent laptop theft Tell employees to use a lock when they are o At home
  • 56. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel
  • 57. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office
  • 58. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop
  • 59. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop o At a conference or training course
  • 60. What to do if your laptop does get stolen Think of a great excuse (because there is no justifiable reason)
  • 61. What to do if your laptop does get stolen Tellyour boss and then take one step back and wait for the answer
  • 62. What to do if your laptop does get stolen TellIT and then take one step back and wait for the answer
  • 63. What to do if your laptop does get stolen Tell your customers and then take one step back and wait for the answer
  • 64. What to do if your laptop does get stolen Tell your shareholders and then take one step back and wait for the answer
  • 65. What to do if your laptop does get stolen Report it to the police (you’ll be amongst others who made the same mistake)
  • 66. What to do if your laptop does get stolen For some of you – start looking for a new job
  • 67. What to do if your laptop does get stolen For some of you – change all your passwords
  • 68. What to do if your laptop does get stolen Ask friends for photos they may have as copies of the ones you just lost
  • 69. What to do if your laptop does get stolen Feign insanity
  • 70. What to do if your laptop does get stolen Beg IT to get you another one fast
  • 71. What to do if your laptop does get stolen Start rewriting the urgent report you just lost
  • 72. What to do if your laptop does get stolen Request an expense authorisation for a new laptop
  • 73. General Don't leave laptops unattended and always lock
  • 74. General Don't allow anyone else to use your laptop — it is company equipment and provides access to our networks
  • 75. General If left at work overnight, lock out of sight
  • 76. General Choose an ordinary looking briefcase or non-traditional laptop carry bag Bags that obviously contain computers are an easily identifiable target for the casual thief
  • 77. At Home Always store inside your home, never leave in the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard or strong drawer
  • 78. At Home When it is not possible to lock away, use your supplied T-bar lock attaching to either an immoveable object or to something that is difficult or heavy to carry
  • 79. At Home Do not allow any use that is not authorised by The Company
  • 80. At Home Onlyconnect to approved or known wireless networks Ideally use your encrypted domestic connection if available
  • 81. In the Car Your laptop will be safer if it is not left in the car at all
  • 82. In the Car If absolutely necessary, lock out of sight in the boot
  • 83.
  • 84.
  • 85. Public Transport and Public Places. Laptops are particularly vulnerable to theft and loss while using public transport
  • 86. Public Transport and Public Places. Do not use your laptop while travelling unless necessary
  • 87. Public Transport and Public Places. Never leave unattended and never allow anyone else to use your laptop
  • 88.
  • 89. Public Transport and Public Places. Only connect to approved or known wireless networks
  • 90. Hotels, Conference and Meeting Rooms Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
  • 91. Hotels, Conference and Meeting Rooms In conference and meeting rooms, use your T-bar lock
  • 92. Data Protection Responsibilities Always use encryption software approved and supplied by The Company
  • 93. Data Protection Responsibilities Choose a password that is unique to your data-encryption key; make it long, random and complicated to guess
  • 94.
  • 95. Data Protection Responsibilities Your laptop is the property of The Company; do not lend it to anyone
  • 96.
  • 97. Malware Responsibilities The Company provides all laptop users with pre-installed antivirus software Make sure you know how to access and use this software. Call the helpdesk for advice if needed
  • 98. Malware Responsibilities If you do not have regular access to The Company's network then you will not receive regular antivirus updates Make sure you log on to the company network at least once a week
  • 99. Malware Responsibilities Always scan files for viruses Your email is automatically scanned for you as are files from the company network If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
  • 100. Malware Responsibilities Do not open any email attachments unless they were expected and from a trusted source Email attachments are the number-one malware risk
  • 101. Malware Responsibilities Do not download any software. If you need a different or more current application, contact the helpdesk for advice Most permitted applications are updated automatically for you when you log into the company network
  • 102. Malware Responsibilities If you suspect a virus attack, contact the helpdesk immediately Do not access the company network or back up files until your laptop has been inspected
  • 103. 1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
  • 104. Sources *http://intel.ly/mkvRrl **http://bit.ly/jN3RHl http://clicksafe.kensington.com/laptop-physical-security-a-scary-but-helpful-guide-for-it-managers/ http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
  • 105. Image credit Slide 3 http://skincitysl.com/ Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html Slide 6: http://triutami1359.blogspot.com/ Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/ Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/ Slide 9: http://themensgiftguide.com/blog/?p=355 Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/ Slide 11: http://www.hodson-office.co.uk/ Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/ Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/ Slide 19: http://www.singlesolution.com/blog/page/2/ Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6 Slide 22: http://www.justcalendar.org/calendar/calendar.jpg Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/ Slide 24: http://www.pspsps.tv/2008/06/ Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/ Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/ Slide 28: http://uk.askmen.com/money/keywords/espionage.html Slide 29: http://www.americanbadbusinesslist.com/identity-theft/ Slide 30: http://www.uktranslation.co.uk/ Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
  • 106. Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/ Slide 42: http://www.recover-lost-data.co.uk/ Slide 44: http://www.vibrant.com/cable-messes.php Slide 48: http://inchatatime.blogspot.com/2007_11_01_archive.html Slide 52: http://speechempoweredcomputing.co.uk/Newsletter/ Slide 53: http://news.bbc.co.uk/1/hi/8220274.stm Slides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.html Slides 81- 86: http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=Keywords Slides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/ Slides 101-107: http://www.malware-help.com/ Slide 95- 100: http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx