UK BUSINESSES LOSING THE WAR ON COMPUTER THEFT Security Park - Losing the war on computer theft:
Losing the war on computer theft
For many UK businesses, physically securing computers is preferable to encryption or password protection. This is borne out by the DTI Information Security Breaches Survey 2006 managed by PricewaterhouseCoopers, which reports that 'while 24% of large UK businesses encrypt or password protect their computers' hard discs, 28% of them actually physically secure their desktop PCs and laptops'. Also, it reports that 'the bigger the organisation, the more likely it is to have computer equipment stolen”.
However, although it reports that 82% of very large businesses reported theft of equipment by outsiders, it also states that a third of all thefts of equipment in large businesses are carried out by their own staff. Therefore, physical security should be the first line of defence in a company’s security policy, providing an initial deterrent to would-be thieves from inside and outside the organisation.
High quality locks, such as those manufactured by PC Guardian, offer users a new generation of computer and office equipment security. Such locks are installed in seconds without a key – just insert the locking head and push! The head swivels and pivots to resist prying and twisting, and the compact design prevents 'laptop wobble' on low-profile equipment. A good lock will come with spacers to ensure a superior fit on a wide variety of equipment, and when it comes to releasing the lock from the security slot, a bevelled keyhole design guides keys into position for easy unlocking.
Cables should be made of multi interwoven aircraft-quality steel strands with a PVC coating, and those with a diameter of 1/3” will deter even the most prepared thief!
Locks can be keyed different, keyed alike, or master keyed, while the 4-digit combination locks can be resettable, “pre-set in the factory”, or master keyed.
Reputable lock manufacturers offer an online key and combination number registration system for free and secure registration of their products, and this creates an important record that can be accessed if losing a key or forgetting a combination.
USB Port Locks, which reduce the risk of data leakage, data theft, computer viruses and malware by physically blocking USB ports from unauthorised access must also not be overlooked. They offer the most economical solution to preventing unauthorised data transfer within an organisation.
Some locks have now been adapted to ‘multi purpose’ devices, allowing users the flexibility of a retractable lock - which locks back into its handle to create a secure loop, and has a convenient push button retractable cable - to meet the needs for laptop security ‘on the move’.
This often overlooked area of security has increasingly been the subject of press interest, with reports of the theft of a laptop containing top-secret security plans for the 2006 Labour Party Conference being stolen from a vehicle parked at the motorway services on the M3 in Hampshire to the more recent theft of a laptop belonging to a Nationwide employee being stolen from his home, costing Nationwide a hefty £98,000 fine from the FSA.
Laptops are now common items of luggage for both business and leisure travellers, and in addition to the computer itself, they contain critical business or valuable personal information whose “cost” cannot be valued.
Locks can be used to secure laptops, luggage, briefcases and more, and whether a laptop is in the home, in the boot of a car, or in an office or hotel, the first line of defence against theft will always be physical security.
One of the eight principles of the Data Protection Act 1998 is that data must remain “secure.
However, the afore-mentioned DTI Survey reports that only “nearly one in six businesses overall physically secures their PCs”. This means that in the war on computer theft, just over five in six businesses have no first line of defence, and that’s no way to win a war.
Article contributed by Nigel Trevena, IT Security Specialist, Avanquest UK
Legend
Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED
Tuesday, May 01, 2007
Labels:
Data And/Or Identity Theft Issue
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment