Ongoing Laptop Theft Means IT Needs to Be Vigilant; Corporate End Users Are Not

Given the constant hype around tablets and smartphones, we sometimes forget that the laptop is still the go-to staple in the business world.

Although office workers are intrigued with the romance around the Internet of things, Brian Westover artfully proclaimed in PC Magazine: “Bottom Line: If you need to do serious work, need powerful processing or multitasking, or need compatibility with a specific accessory or storage device, there’s no good alternative to the laptop.”

Too bad those laptops are lost or stolen all the time — with consequences that are often serious.

In late 2013, InformationWeek reported on an Intel commissioned survey by Ponemon Research that found 329 organizations had lost more than 86,000 laptops over a 12-month period. Ponemon estimated a cumulative total cost of $2.1 billion ($6.4 million per organization), based on the research.

Laptops are essential to our daily, business-driven lives and yet they are being misplaced or stolen all too often. You’d think consumers would get the message – right? Wrong.

A recently-conducted Harris Interactive poll commissioned by WinMagic, showed only 14-percent of consumers encrypt the data on their laptops. The alarming results in the survey prompted us to write an eBook with tips and tricks for IT pros, given the bad habits their end users are bringing into the office. You can download the eBook by visiting here.

Even though we read about laptop theft all the time, we still forget that regulations requiring the disclosure of data loss don’t discriminate based on the ownership of the lost machine. Many employees have corporate data on their personal machines – the same machines that are disappearing left and right. The bad habits of corporate end users impact a business, regardless of where the work is done. Corporate IT needs to take note.

Previous Post
RSA Conference 2014
Next Post
Connect with us again!

Related Posts

The importance of partners

Go to market strategies for vendors varies in approach whether it’s entirely direct, indirect or an amalgamation of both. WinMagic adheres to a hybrid approach that best matching the requirements of the customer or business practices within a given region.…
Read more

All for One

As a specialized software company that focuses on data encryption and security with strengths in key management and overall encryption management, it’s extremely important to maintain strong relationships with OEMs. (more…)
Read more

Database Security

Buffer, a social media scheduling service, Buffer, found itself on the receiving end of a data-breach back in October. The culprit behind the breach was the company’s database provider. The breach resulted in the exposure of user account credentials that…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 0 seconds