Talent Management Asia: Asia's leading HR strategy conference returns for its seventh year.
Unmissable opportunity to attend the go-to conference for HR leaders - debate key talent management challenges and share insights on future people strategy. Register now »
Your employees most likely wouldn’t dream of leaving their company laptop unattended in a crowded restaurant, in fear of having it stolen. In reality, it’s the workplace they should be worried about, with 23% of IT theft occurring at the office.
That is according to an IT Security & Laptop Theft Survey conducted by Kensington. The survey polled IT professionals across industries on the prevalence and circumstances of IT theft.
According to the survey, the four locations where IT theft takes place most often are:
- In cars / transportation (25%)
- In the office (23%)
- In airports / hotels (15%)
- In restaurants (12%)
“The survey findings show that a surprisingly high percentage of IT theft occurs in-house”, Rob Humphrey, director of global product management, security, Kensington, commented in a press release. This goes against the general assumption that employees can leave their laptop unsecured at their desk worry-free.
Although it can be argued that people shouldn’t be stealing stuff in the first place, it won’t hurt to have a good security policy in place to prevent theft, or keep its consequences to a minimum.
“Since studies confirm that well implemented security can significantly decrease laptop theft by as much as 85%, it’s important for IT personnel to consistently use physical locks for computing and mobile equipment to provide resistance to tampering and theft”, Humphrey advises.
“Simple and secure device locking products can give organizations the added layer of protection they need to safeguard both their data and their mobile assets”.
Unfortunately, even with company laptops safe and secure, companies still run the risk of having their contents stolen. A recent report on data breaches found that in 93% of cases, it took attackers minutes or less to compromise systems. 63% involved leveraging weak, default or stolen passwords.
Photo / 123RF