SlideShare a Scribd company logo
1 of 111
Laptop physical security  A scary but helpful guide for IT managers  In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer  	That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
This dismal scenario is extremely common. Around 90% of organisations are affected
Laptop TheftQ. Has your organisation, or any of your employees, experienced laptop theft or loss
The top seven excuses your colleagues will use are:  We were burgled
The top seven excuses your colleagues will use are:  2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
The top seven excuses your colleagues will use are:  		3. I was only away for a minute
The top seven excuses your colleagues will use are:  4. I left it in the car
The top seven excuses your colleagues will use are:  5. I thought it would be safe
The top seven excuses your colleagues will use are:  	6. I asked the person next to me to watch my stuff –  he looked really trustworthy
The top seven excuses your colleagues will use are:  	7. It was on my desk – then it was gone
Most theft is  Opportunistic Once reformatted, stolen laptops are difficult to spot  Most laptops - 58% - are stolen from work Thieves usually steal laptops for their resale value rather than for the data Laptops are easy to sell anonymously over the internet
IDC research shows that the office is the most likely place for a thief to strike
Where your laptops WILL BE stolen from:
86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen  56% report that it resulted in a data breach
59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
52% of business managers sometimes or often leave their laptop with a stranger when travelling
1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
89% of companies experience laptop loss
It takes average of 9 days to get fully operational after laptop loss
The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
Business problems you can avoid by using laptop locks  Loss of  reputation
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  		Risk of industrial  			espionage
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage Reduce the likelihood  			of identity theft
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage  		Reduce the likelihood of identity theft  Losing customers
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage  Reduce the likelihood of identity theft  Losing customers  Having to tell your customer you lost their data because you were careless
Theft PreventionQ. What proportion of laptop theft do you believe would not have occurred if a cable lock had been used?
The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft is $47,000 for larger organisations  – some of which can have over 1,000 laptops..
IDC suggests that organisations typically underestimate the cost of laptop theft by over 30% particularly the cost of downtime
And remember you’ll only ever get  3%  of the lost or stolen laptops back
7 common misconceptions  1. Encryption is the way forward
1. Encryption is the way forward.  Company policies now routinely stipulate that any data leaving an office must be encrypted  Around 50% of executives turn off encryption on their laptops if they can Encryption can never stop someone walking off with a laptop
7 common misconceptions  2. Better door security in the office is the  answer
	2. Better door security in the office is the answer  	Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter  	Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
7 common misconceptions  3. It won’t happen to me or my employees
	3. It won’t happen to me or my employees A typical business laptop lasts for 3.1 years 	Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
7 common misconceptions  4. I can recover the data
	4. I can recover the data.  	On average it will take you nine days to replace a laptop – so you’ll certainly have time to try  35% of companies have never tried to successfully restore from their back up, so it might not work at all
7 common misconceptions  		5. Cable locks are ugly and fiddly
	5. Cable locks are ugly and fiddly...  	Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
7 common misconceptions  6. Nobody like using laptop locks
	6. Nobody like using laptop locks. 	Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
7 common misconceptions  7. My employees simply won’t use laptop locks
	7. My employees simply won’t use laptop locks.  	They certainly will if you make the consequences of not using them serious enough 	Introducing cultural change into any organisation can take effort, but there’s a tipping point after which it becomes more natural to embrace the change than to fight it
How to prevent laptop theft  Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves A laptop lock is the front line of defence
How to prevent laptop theft  Add a clause to your HR or company policy to give people the right incentive to use a lock
How to prevent laptop theft  	Give colleagues brief training in theft awareness when you hand them out a lock
How to prevent laptop theft  	Ask employees not to leave their laptops in unattended cars
How to prevent laptop theft  	Insist and make it a disciplinary matter – your business and reputation is certainly worth it
How to prevent laptop theft  Tell employees to use a lock when they are  o At home
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office  o In a coffee shop
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office  o In a coffee shop  o At a conference or training course
What to do if your laptop does get stolen  Think of a great excuse (because there is no justifiable reason)
What to do if your laptop does get stolen  Tellyour boss and then take one step back and wait for the answer
What to do if your laptop does get stolen  TellIT and then take one step back and wait for the answer
What to do if your laptop does get stolen  Tell your customers and then take one step back and wait for the answer
What to do if your laptop does get stolen  Tell your shareholders and then take one step back and wait for the answer
What to do if your laptop does get stolen  Report it to the police (you’ll be amongst others who made the same mistake)
What to do if your laptop does get stolen  For some of you – start looking for a new job
What to do if your laptop does get stolen  For some of you – change all your passwords
What to do if your laptop does get stolen  Ask friends for photos they may have as copies of the ones you just lost
What to do if your laptop does get stolen  Feign insanity
What to do if your laptop does get stolen  Beg IT to get you another one fast
What to do if your laptop does get stolen  Start rewriting the urgent report you just lost
What to do if your laptop does get stolen  Request an expense authorisation for a new laptop
General  Don't leave laptops unattended and always lock
General  Don't allow anyone else to use your laptop — it is company equipment and provides access to our networks
General  If left at work overnight, lock out of sight
General  Choose an ordinary looking briefcase or non-traditional laptop carry bag Bags that obviously contain computers are an easily identifiable target for the casual thief
At Home  Always store inside your home, never leave in the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard or strong drawer
At Home  When it is not possible to lock away, use your supplied T-bar lock attaching to either an immoveable object or to something that is difficult or heavy to carry
At Home  Do not allow any use that is not authorised by The Company
At Home  Onlyconnect to approved or known wireless networks Ideally use your encrypted domestic connection if available
In the Car  Your laptop will be safer if it is not left in the car at all
In the Car  If absolutely necessary, lock out of sight in the boot
In the Car  If you expect to leave your laptop in the car regularly, speak to the helpdesk and ask about additional security measures  ,[object Object],[object Object]
In the Car  While the vehicle is in motion, your laptop should be stored in its carry bag  ,[object Object],[object Object]
Public Transport and Public Places.  Laptops are particularly vulnerable to theft and loss while using public transport
Public Transport and Public Places.  Do not use your laptop while travelling unless necessary
Public Transport and Public Places.  Never leave unattended and never allow anyone else to use your laptop
Public Transport and Public Places.  Be aware of your surroundings  ,[object Object],[object Object]
Public Transport and Public Places.  Only connect to approved or known wireless networks
Hotels, Conference and Meeting Rooms  Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
Hotels, Conference and Meeting Rooms  In conference and meeting rooms, use your T-bar lock
Data Protection Responsibilities  Always use encryption software approved and supplied by The Company
Data Protection Responsibilities  Choose a password that is unique to your data-encryption key; make it long, random and complicated to guess
Data Protection Responsibilities  Do not give your network password or token/access device to anyone ,[object Object],[object Object]
Data Protection Responsibilities  Your laptop is the property of The Company; do not lend it to anyone
Data Protection Responsibilities  If you leave your laptop switched on and unattended you must activate the password-protected screensaver ,[object Object],[object Object]
Malware Responsibilities  The Company provides all laptop users with pre-installed antivirus software Make sure you know how to access and use this software. Call the helpdesk for advice if needed
Malware Responsibilities  If you do not have regular access to The Company's network then you will not receive regular antivirus updates Make sure you log on to the company network at least once a week
Malware Responsibilities  Always scan files for viruses Your email is automatically scanned for you as are files from the company network If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
Malware Responsibilities  Do not open any email attachments unless they were expected and from a trusted source Email attachments are the number-one malware risk
Malware Responsibilities  Do not download any software. If you need a different or more current application, contact the helpdesk for advice Most permitted applications are updated automatically for you when you log into the company network
Malware Responsibilities  If you suspect a virus attack, contact the helpdesk immediately Do not access the company network or back up files until your laptop has been inspected
1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
Sources  *http://intel.ly/mkvRrl  **http://bit.ly/jN3RHl  http://clicksafe.kensington.com/laptop-physical-security-a-scary-but-helpful-guide-for-it-managers/ http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
Image credit Slide 3 http://skincitysl.com/ Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html Slide 6: http://triutami1359.blogspot.com/ Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/ Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/ Slide 9: http://themensgiftguide.com/blog/?p=355 Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/ Slide 11: http://www.hodson-office.co.uk/ Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/ Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/ Slide 19: http://www.singlesolution.com/blog/page/2/ Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6 Slide 22: http://www.justcalendar.org/calendar/calendar.jpg Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/ Slide 24: http://www.pspsps.tv/2008/06/ Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/ Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/ Slide 28: http://uk.askmen.com/money/keywords/espionage.html Slide 29: http://www.americanbadbusinesslist.com/identity-theft/ Slide 30: http://www.uktranslation.co.uk/ Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/ Slide 42: http://www.recover-lost-data.co.uk/ Slide 44: http://www.vibrant.com/cable-messes.php Slide 48: http://inchatatime.blogspot.com/2007_11_01_archive.html Slide 52: http://speechempoweredcomputing.co.uk/Newsletter/ Slide 53: http://news.bbc.co.uk/1/hi/8220274.stm Slides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.html Slides 81- 86:  http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=Keywords Slides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/ Slides 101-107: http://www.malware-help.com/ Slide 95- 100:  http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx
Laptop physical security
Laptop physical security
Laptop physical security
Laptop physical security
Laptop physical security

More Related Content

What's hot (20)

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Your Botnet is My Botnet:  Analysis of a Botnet TakeoverYour Botnet is My Botnet:  Analysis of a Botnet Takeover
Your Botnet is My Botnet: Analysis of a Botnet Takeover
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 

Viewers also liked

A guide to using iPads in the classroom
A guide to using iPads in the classroomA guide to using iPads in the classroom
A guide to using iPads in the classroomLapSafe Products
 
A guide to ICT security in schools
A guide to ICT security in schoolsA guide to ICT security in schools
A guide to ICT security in schoolsLapSafe Products
 
Campus Laptop Security 2010
Campus Laptop Security 2010Campus Laptop Security 2010
Campus Laptop Security 2010stoptheft
 
A guide to games-based learning
A guide to games-based learningA guide to games-based learning
A guide to games-based learningLapSafe Products
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorLapSafe Products
 
A guide to simple school science experiments
A guide to simple school science experiments A guide to simple school science experiments
A guide to simple school science experiments LapSafe Products
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 

Viewers also liked (8)

Laptop theft statistics
Laptop theft statisticsLaptop theft statistics
Laptop theft statistics
 
A guide to using iPads in the classroom
A guide to using iPads in the classroomA guide to using iPads in the classroom
A guide to using iPads in the classroom
 
A guide to ICT security in schools
A guide to ICT security in schoolsA guide to ICT security in schools
A guide to ICT security in schools
 
Campus Laptop Security 2010
Campus Laptop Security 2010Campus Laptop Security 2010
Campus Laptop Security 2010
 
A guide to games-based learning
A guide to games-based learningA guide to games-based learning
A guide to games-based learning
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public Sector
 
A guide to simple school science experiments
A guide to simple school science experiments A guide to simple school science experiments
A guide to simple school science experiments
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 

Similar to Laptop physical security

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer SecureNiall Roche
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
What does Glen Tupling do?
What does Glen Tupling do?What does Glen Tupling do?
What does Glen Tupling do?gtupling
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminAntonio Sanz Alcober
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And SecureRob Clement
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech SupportHoward Page
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Ron Pierce
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tipsar-rifke.com
 

Similar to Laptop physical security (20)

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer Secure
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
What does Glen Tupling do?
What does Glen Tupling do?What does Glen Tupling do?
What does Glen Tupling do?
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech Support
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tips
 

Recently uploaded

(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...ranjana rawat
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gapedkojalkojal131
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...Call Girls in Nagpur High Profile
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service ThanePooja Nehwal
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...ranjana rawat
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointGetawu
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Naicy mandal
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhisoniya singh
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...Pooja Nehwal
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...Suhani Kapoor
 

Recently uploaded (20)

(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
Call Girls In Vaishali 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Vaishali 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Vaishali 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Vaishali 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
 

Laptop physical security

  • 1. Laptop physical security A scary but helpful guide for IT managers In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
  • 2. Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
  • 3. This dismal scenario is extremely common. Around 90% of organisations are affected
  • 4. Laptop TheftQ. Has your organisation, or any of your employees, experienced laptop theft or loss
  • 5. The top seven excuses your colleagues will use are: We were burgled
  • 6. The top seven excuses your colleagues will use are: 2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
  • 7. The top seven excuses your colleagues will use are: 3. I was only away for a minute
  • 8. The top seven excuses your colleagues will use are: 4. I left it in the car
  • 9. The top seven excuses your colleagues will use are: 5. I thought it would be safe
  • 10. The top seven excuses your colleagues will use are: 6. I asked the person next to me to watch my stuff – he looked really trustworthy
  • 11. The top seven excuses your colleagues will use are: 7. It was on my desk – then it was gone
  • 12. Most theft is Opportunistic Once reformatted, stolen laptops are difficult to spot Most laptops - 58% - are stolen from work Thieves usually steal laptops for their resale value rather than for the data Laptops are easy to sell anonymously over the internet
  • 13. IDC research shows that the office is the most likely place for a thief to strike
  • 14. Where your laptops WILL BE stolen from:
  • 15. 86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen 56% report that it resulted in a data breach
  • 16. 59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
  • 17. 65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
  • 18. 50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
  • 19. 52% of business managers sometimes or often leave their laptop with a stranger when travelling
  • 20. 1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
  • 21. 89% of companies experience laptop loss
  • 22. It takes average of 9 days to get fully operational after laptop loss
  • 23. The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
  • 24. Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
  • 25. Business problems you can avoid by using laptop locks Loss of reputation
  • 26. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”
  • 27. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body
  • 28. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage
  • 29. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft
  • 30. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft Losing customers
  • 31. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft Losing customers Having to tell your customer you lost their data because you were careless
  • 32. Theft PreventionQ. What proportion of laptop theft do you believe would not have occurred if a cable lock had been used?
  • 33. The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft is $47,000 for larger organisations – some of which can have over 1,000 laptops..
  • 34. IDC suggests that organisations typically underestimate the cost of laptop theft by over 30% particularly the cost of downtime
  • 35. And remember you’ll only ever get 3% of the lost or stolen laptops back
  • 36. 7 common misconceptions 1. Encryption is the way forward
  • 37. 1. Encryption is the way forward. Company policies now routinely stipulate that any data leaving an office must be encrypted Around 50% of executives turn off encryption on their laptops if they can Encryption can never stop someone walking off with a laptop
  • 38. 7 common misconceptions 2. Better door security in the office is the answer
  • 39. 2. Better door security in the office is the answer Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
  • 40. 7 common misconceptions 3. It won’t happen to me or my employees
  • 41. 3. It won’t happen to me or my employees A typical business laptop lasts for 3.1 years Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
  • 42. 7 common misconceptions 4. I can recover the data
  • 43. 4. I can recover the data. On average it will take you nine days to replace a laptop – so you’ll certainly have time to try 35% of companies have never tried to successfully restore from their back up, so it might not work at all
  • 44. 7 common misconceptions 5. Cable locks are ugly and fiddly
  • 45. 5. Cable locks are ugly and fiddly... Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
  • 46. 7 common misconceptions 6. Nobody like using laptop locks
  • 47. 6. Nobody like using laptop locks. Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
  • 48. 7 common misconceptions 7. My employees simply won’t use laptop locks
  • 49. 7. My employees simply won’t use laptop locks. They certainly will if you make the consequences of not using them serious enough Introducing cultural change into any organisation can take effort, but there’s a tipping point after which it becomes more natural to embrace the change than to fight it
  • 50. How to prevent laptop theft Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves A laptop lock is the front line of defence
  • 51. How to prevent laptop theft Add a clause to your HR or company policy to give people the right incentive to use a lock
  • 52. How to prevent laptop theft Give colleagues brief training in theft awareness when you hand them out a lock
  • 53. How to prevent laptop theft Ask employees not to leave their laptops in unattended cars
  • 54. How to prevent laptop theft Insist and make it a disciplinary matter – your business and reputation is certainly worth it
  • 55. How to prevent laptop theft Tell employees to use a lock when they are o At home
  • 56. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel
  • 57. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office
  • 58. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop
  • 59. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop o At a conference or training course
  • 60. What to do if your laptop does get stolen Think of a great excuse (because there is no justifiable reason)
  • 61. What to do if your laptop does get stolen Tellyour boss and then take one step back and wait for the answer
  • 62. What to do if your laptop does get stolen TellIT and then take one step back and wait for the answer
  • 63. What to do if your laptop does get stolen Tell your customers and then take one step back and wait for the answer
  • 64. What to do if your laptop does get stolen Tell your shareholders and then take one step back and wait for the answer
  • 65. What to do if your laptop does get stolen Report it to the police (you’ll be amongst others who made the same mistake)
  • 66. What to do if your laptop does get stolen For some of you – start looking for a new job
  • 67. What to do if your laptop does get stolen For some of you – change all your passwords
  • 68. What to do if your laptop does get stolen Ask friends for photos they may have as copies of the ones you just lost
  • 69. What to do if your laptop does get stolen Feign insanity
  • 70. What to do if your laptop does get stolen Beg IT to get you another one fast
  • 71. What to do if your laptop does get stolen Start rewriting the urgent report you just lost
  • 72. What to do if your laptop does get stolen Request an expense authorisation for a new laptop
  • 73. General Don't leave laptops unattended and always lock
  • 74. General Don't allow anyone else to use your laptop — it is company equipment and provides access to our networks
  • 75. General If left at work overnight, lock out of sight
  • 76. General Choose an ordinary looking briefcase or non-traditional laptop carry bag Bags that obviously contain computers are an easily identifiable target for the casual thief
  • 77. At Home Always store inside your home, never leave in the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard or strong drawer
  • 78. At Home When it is not possible to lock away, use your supplied T-bar lock attaching to either an immoveable object or to something that is difficult or heavy to carry
  • 79. At Home Do not allow any use that is not authorised by The Company
  • 80. At Home Onlyconnect to approved or known wireless networks Ideally use your encrypted domestic connection if available
  • 81. In the Car Your laptop will be safer if it is not left in the car at all
  • 82. In the Car If absolutely necessary, lock out of sight in the boot
  • 83.
  • 84.
  • 85. Public Transport and Public Places. Laptops are particularly vulnerable to theft and loss while using public transport
  • 86. Public Transport and Public Places. Do not use your laptop while travelling unless necessary
  • 87. Public Transport and Public Places. Never leave unattended and never allow anyone else to use your laptop
  • 88.
  • 89. Public Transport and Public Places. Only connect to approved or known wireless networks
  • 90. Hotels, Conference and Meeting Rooms Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
  • 91. Hotels, Conference and Meeting Rooms In conference and meeting rooms, use your T-bar lock
  • 92. Data Protection Responsibilities Always use encryption software approved and supplied by The Company
  • 93. Data Protection Responsibilities Choose a password that is unique to your data-encryption key; make it long, random and complicated to guess
  • 94.
  • 95. Data Protection Responsibilities Your laptop is the property of The Company; do not lend it to anyone
  • 96.
  • 97. Malware Responsibilities The Company provides all laptop users with pre-installed antivirus software Make sure you know how to access and use this software. Call the helpdesk for advice if needed
  • 98. Malware Responsibilities If you do not have regular access to The Company's network then you will not receive regular antivirus updates Make sure you log on to the company network at least once a week
  • 99. Malware Responsibilities Always scan files for viruses Your email is automatically scanned for you as are files from the company network If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
  • 100. Malware Responsibilities Do not open any email attachments unless they were expected and from a trusted source Email attachments are the number-one malware risk
  • 101. Malware Responsibilities Do not download any software. If you need a different or more current application, contact the helpdesk for advice Most permitted applications are updated automatically for you when you log into the company network
  • 102. Malware Responsibilities If you suspect a virus attack, contact the helpdesk immediately Do not access the company network or back up files until your laptop has been inspected
  • 103. 1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
  • 104. Sources *http://intel.ly/mkvRrl **http://bit.ly/jN3RHl http://clicksafe.kensington.com/laptop-physical-security-a-scary-but-helpful-guide-for-it-managers/ http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
  • 105. Image credit Slide 3 http://skincitysl.com/ Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html Slide 6: http://triutami1359.blogspot.com/ Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/ Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/ Slide 9: http://themensgiftguide.com/blog/?p=355 Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/ Slide 11: http://www.hodson-office.co.uk/ Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/ Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/ Slide 19: http://www.singlesolution.com/blog/page/2/ Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6 Slide 22: http://www.justcalendar.org/calendar/calendar.jpg Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/ Slide 24: http://www.pspsps.tv/2008/06/ Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/ Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/ Slide 28: http://uk.askmen.com/money/keywords/espionage.html Slide 29: http://www.americanbadbusinesslist.com/identity-theft/ Slide 30: http://www.uktranslation.co.uk/ Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
  • 106. Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/ Slide 42: http://www.recover-lost-data.co.uk/ Slide 44: http://www.vibrant.com/cable-messes.php Slide 48: http://inchatatime.blogspot.com/2007_11_01_archive.html Slide 52: http://speechempoweredcomputing.co.uk/Newsletter/ Slide 53: http://news.bbc.co.uk/1/hi/8220274.stm Slides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.html Slides 81- 86: http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=Keywords Slides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/ Slides 101-107: http://www.malware-help.com/ Slide 95- 100: http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx