SOUTH AFRICA (OUTSIDE BLOGGER COMMENT) DATA AND COMPUTER THEFT
Data theft in South Africa
Preventing computer theft
The presence of useful office equipment at specific areas inside structures and offices is a sturdy motivating element for theft and robbery. Computers and laptops are an more and more well-liked item for criminals who target them since of their vulnerability, availability and ease of disposal.
Although computer theft is a prevalent challenge during the industrialised earth, in South Africa it has arrived at really critical proportions. In reality, it has been described that much more than 60% of all South African businesses have had computers stolen over the previous 18 months. In South Africa, pc theft is typically accompanied by violence or risk of violence as when, for instance, personnel or protection guards are attacked for the duration of the commission of the crime.
Crime intelligence
Organised crime syndicates have been joined to the current spate of pc thefts and robberies. Industrial/company firms are consequently not dealing with solitary/isolated attacks, but fairly with a systematic motion on the portion of organised criminal gangs running in smaller groups, armed and all set to use violence if needed, eg, when confronted by safety.
In several circumstances, as expert by the writer, the identical firm can be subjected, over a small time period of time, to repeat victimisation due to the fact the criminals know that new pcs are issued within just a few of days.
It has also been reported that personal computers are discovering their way across the borders of South Africa. The presence of developing economies in southern Africa, eg, Mozambique and Angola, provides credibility to this details.
Intelligence gathering indicates that the criminals’ modus operandi when stealing pcs normally involves the following steps.
* They evaluate equally rewards and dangers. If the possibility of identification is too substantial and the reward also tiny, criminals will commonly transfer to an less complicated target.
* They are absolutely knowledgeable of the presence of guards in the complicated and, often, know where to inflict optimum losses in the shortest doable time.
* They generally act at evening in purchase to lessen the chance of identification and apprehension.
* They wait for the perfect second to strike, eg, when safety is as far as achievable from the scene or has just accomplished a patrol.
* They are informed of the reality that, in purchase to keep away from a confrontation with on website protection, armed reaction or police, they require to act as promptly and efficiently as possible, within a extremely confined interval of time, in particular when the alarm has detected their presence.
* They typically act in teams in buy to remove as many computers as possible in the shortest period of time of time probable.
* They are normally armed and prepared to inflict accidents or death to anybody crossing their route.
* Once a business is determined as an uncomplicated target, the possibility for repeat victimisation is quite actual.
Possessing explained that, there have been recorded instances in which an overall security and do the job pressure (typically night time shift employees) in a complex was held up by a established group of robbers. This provides the criminals ample time to trigger highest losses to a organization. In a latest incident involving a equivalent modus operandi, an important news company endured the decline of more than fifty personal computers.
Chance elements
The regions most susceptible to computer system theft, specially smash and grab attacks, are these in which there is a substantial concentration of personal computers, eg, IT and task departments, creditors and debtors departments, etc.
These spots require immediate interest in that they supply the proper chance for criminals to commit computer system theft.
Although staying sited in the boundaries of a nicely guarded complicated minimizes the probability of a theft and robbery assault focusing on pc devices, the possibility for this type of crime to take place really should not be underestimated.
Avoiding personal computer theft
Not only the fast places the place computer systems are found require to be guarded. In reality, it can be said that efficient computer system safety commences with the perimeter fence and proceeds inwards, as a result of a mix of crime reduction actions this kind of as, among other individuals, very good excellent fencing, lighting, external passives, infrareds and beams, CCTV devices, intruder detection devices, sound locks, glass safety (against smash and grab), as well as qualified guards.
The safety of the personal computer by itself is also of the utmost value. In this regard, the adhering to preventive measures need to be deemed.
* Mark your residence in a long term and prominent way. Hold an inventory of all personal computer gear. This can enable avoid internal theft, and will enable the police if you are burgled.
* Prepare to have the computer’s element sections marked, and promote this on the outdoors of the laptop or computer. On the other hand, in the curiosity of security usually look for qualified help prior to opening a laptop or computer and check that you will not invalidate any guarantee or guarantee.
* The most safe area to retailer a personal computer is in a substantial protection cabinet or safe and sound. Some models make it possible for you to use the computer inside the cabinet.
* Alternatively, anchor your computer to some thing reliable. You can resolve it to the work surface with security plates. Some of these units encase the processor unit totally so they guard the components as very well as the computer system. All lock-down gear of this sort ought to conform to damage prevention typical.
* A different way of defending your computer system is to attach it to furnishings or walls with a cable kit which backlinks computer tools collectively. The cables are manufactured of metal and they must be at minimum 7,five mm thick. This technique will help guard the laptop or computer, although it will not protect against a thief gaining accessibility to the computers’ parts. A reduced charge way of supplying some safety to the elements is to swap the cabinet screws with security screws.
* Suit an alarm. Some of these healthy within the computer system and sound if the devices is moved. Other individuals, called ‘loop’ alarms have a cable which passes as a result of the products and which seems if it is broken.
* Site the personal computer absent from the ground flooring windows if achievable.
* Don’t forget to again-up knowledge on disk on a normal basis or at a remote station through the intranet. The knowledge in your pc can also be safeguarded by working with locking gadgets which cover or slot into the disk drive’s bezel.
* If you have a transportable pc or laptop computer around with you, keep it out of sight when you are travelling.
* Do not leave it in see in a car or truck, even when you are in the auto on your own – thieves may possibly check out to snatch it when the auto is stationary.
* Remember that thieves will recognise the special cases that portable personal computers arrive in – conceal them in a briefcase or bag as a substitute.
* Carry again-up disks and, if you are able to, tough disk drives individually.
* Do not leave a transportable personal computer lying about in the business office – maintain it locked absent or just take it house at the conclude of a functioning day.
Conclusion
Beside the negative money implications, the loss of various pcs as a consequence of crime may well cause a serious disruption to a company’s pursuits. Moreover, the chance of a violent confrontation throughout an incident of laptop or computer theft need to in no way be underestimated. For that reason, the adoption of the most effective defensive methods is of the utmost relevance.
Sites worth visiting:
Data Backup
TUMBLR
The presence of useful office equipment at specific areas inside structures and offices is a sturdy motivating element for theft and robbery. Computers and laptops are an more and more well-liked item for criminals who target them since of their vulnerability, availability and ease of disposal.
Although computer theft is a prevalent challenge during the industrialised earth, in South Africa it has arrived at really critical proportions. In reality, it has been described that much more than 60% of all South African businesses have had computers stolen over the previous 18 months. In South Africa, pc theft is typically accompanied by violence or risk of violence as when, for instance, personnel or protection guards are attacked for the duration of the commission of the crime.
Crime intelligence
Organised crime syndicates have been joined to the current spate of pc thefts and robberies. Industrial/company firms are consequently not dealing with solitary/isolated attacks, but fairly with a systematic motion on the portion of organised criminal gangs running in smaller groups, armed and all set to use violence if needed, eg, when confronted by safety.
In several circumstances, as expert by the writer, the identical firm can be subjected, over a small time period of time, to repeat victimisation due to the fact the criminals know that new pcs are issued within just a few of days.
It has also been reported that personal computers are discovering their way across the borders of South Africa. The presence of developing economies in southern Africa, eg, Mozambique and Angola, provides credibility to this details.
Intelligence gathering indicates that the criminals’ modus operandi when stealing pcs normally involves the following steps.
* They evaluate equally rewards and dangers. If the possibility of identification is too substantial and the reward also tiny, criminals will commonly transfer to an less complicated target.
* They are absolutely knowledgeable of the presence of guards in the complicated and, often, know where to inflict optimum losses in the shortest doable time.
* They generally act at evening in purchase to lessen the chance of identification and apprehension.
* They wait for the perfect second to strike, eg, when safety is as far as achievable from the scene or has just accomplished a patrol.
* They are informed of the reality that, in purchase to keep away from a confrontation with on website protection, armed reaction or police, they require to act as promptly and efficiently as possible, within a extremely confined interval of time, in particular when the alarm has detected their presence.
* They typically act in teams in buy to remove as many computers as possible in the shortest period of time of time probable.
* They are normally armed and prepared to inflict accidents or death to anybody crossing their route.
* Once a business is determined as an uncomplicated target, the possibility for repeat victimisation is quite actual.
Possessing explained that, there have been recorded instances in which an overall security and do the job pressure (typically night time shift employees) in a complex was held up by a established group of robbers. This provides the criminals ample time to trigger highest losses to a organization. In a latest incident involving a equivalent modus operandi, an important news company endured the decline of more than fifty personal computers.
Chance elements
The regions most susceptible to computer system theft, specially smash and grab attacks, are these in which there is a substantial concentration of personal computers, eg, IT and task departments, creditors and debtors departments, etc.
These spots require immediate interest in that they supply the proper chance for criminals to commit computer system theft.
Although staying sited in the boundaries of a nicely guarded complicated minimizes the probability of a theft and robbery assault focusing on pc devices, the possibility for this type of crime to take place really should not be underestimated.
Avoiding personal computer theft
Not only the fast places the place computer systems are found require to be guarded. In reality, it can be said that efficient computer system safety commences with the perimeter fence and proceeds inwards, as a result of a mix of crime reduction actions this kind of as, among other individuals, very good excellent fencing, lighting, external passives, infrareds and beams, CCTV devices, intruder detection devices, sound locks, glass safety (against smash and grab), as well as qualified guards.
The safety of the personal computer by itself is also of the utmost value. In this regard, the adhering to preventive measures need to be deemed.
* Mark your residence in a long term and prominent way. Hold an inventory of all personal computer gear. This can enable avoid internal theft, and will enable the police if you are burgled.
* Prepare to have the computer’s element sections marked, and promote this on the outdoors of the laptop or computer. On the other hand, in the curiosity of security usually look for qualified help prior to opening a laptop or computer and check that you will not invalidate any guarantee or guarantee.
* The most safe area to retailer a personal computer is in a substantial protection cabinet or safe and sound. Some models make it possible for you to use the computer inside the cabinet.
* Alternatively, anchor your computer to some thing reliable. You can resolve it to the work surface with security plates. Some of these units encase the processor unit totally so they guard the components as very well as the computer system. All lock-down gear of this sort ought to conform to damage prevention typical.
* A different way of defending your computer system is to attach it to furnishings or walls with a cable kit which backlinks computer tools collectively. The cables are manufactured of metal and they must be at minimum 7,five mm thick. This technique will help guard the laptop or computer, although it will not protect against a thief gaining accessibility to the computers’ parts. A reduced charge way of supplying some safety to the elements is to swap the cabinet screws with security screws.
* Suit an alarm. Some of these healthy within the computer system and sound if the devices is moved. Other individuals, called ‘loop’ alarms have a cable which passes as a result of the products and which seems if it is broken.
* Site the personal computer absent from the ground flooring windows if achievable.
* Don’t forget to again-up knowledge on disk on a normal basis or at a remote station through the intranet. The knowledge in your pc can also be safeguarded by working with locking gadgets which cover or slot into the disk drive’s bezel.
* If you have a transportable pc or laptop computer around with you, keep it out of sight when you are travelling.
* Do not leave it in see in a car or truck, even when you are in the auto on your own – thieves may possibly check out to snatch it when the auto is stationary.
* Remember that thieves will recognise the special cases that portable personal computers arrive in – conceal them in a briefcase or bag as a substitute.
* Carry again-up disks and, if you are able to, tough disk drives individually.
* Do not leave a transportable personal computer lying about in the business office – maintain it locked absent or just take it house at the conclude of a functioning day.
Conclusion
Beside the negative money implications, the loss of various pcs as a consequence of crime may well cause a serious disruption to a company’s pursuits. Moreover, the chance of a violent confrontation throughout an incident of laptop or computer theft need to in no way be underestimated. For that reason, the adoption of the most effective defensive methods is of the utmost relevance.
Sites worth visiting:
Data Backup
TUMBLR
No comments:
Post a Comment