What You Need to Know About Laptop Theft…

Laptops contain valuable data – making them profitable targets for thieves, scammers, and fraudsters. It may not be a huge financial burden to replace one stolen device, but a resulting data breach could have drastic consequences. Here are some tips and stats to help you keep your devices secure.

 

Should I be worried about laptop theft?

One laptop is stolen every 53 seconds, so some concern is definitely warranted. However, there are ways to mitigate the risks of laptop theft. There is more reason for concern if you leave your laptop unattended in public areas or in your vehicle, and when you have it outside of your workplace or in transit. Implementing strong security measures will allow you to take action to protect your device if it does go missing.

What is the cost of a stolen laptop?

The cost of a stolen or lost laptop goes far beyond replacement. Costs include detection, forensics, legal expenses, and lost productivity. A laptop is not just a physical device – it is a store of valuable data and personal information. If the missing laptop leads to a data breach, the costs are much more severe, and can impact individuals and companies for years. Overall, one missing laptop costs an average of $49,246.

Where does laptop theft happen the most?

A study found that laptops are lost or stolen most often outside of work at 43%. The next highest risk area is in-transit at 33%, and the workplace accounts for 12%. The recent increase in remote work is likely having an impact, and the “outside of work” category is already the highest. Having a way to remotely manage laptops can help companies lower the chance of an employee’s device being lost or stolen, and it can reduce the risk of data compromise.

What security solutions are available?

The Trusted Platform Module (TPM) is a security feature built in to the hard drives of most new computers. It protects the hard drive from being accessed from an unfamiliar device. To check if your computer has a TPM, press Windows+R, type tpm.msc and press Enter. You should see information about your computer’s TPM. If you see a message saying that a compatible TPM cannot be found, then your computer does not have one.

Encryption makes the data on a drive unreadable unless it is being accessed by an authorized user. BitLocker is the enterprise encryption option for Windows, Device Encryption is available on personal Windows machines, and VeraCrypt is an open-source option that works on Windows, MacOS, and Linux. A TPM can be used alongside encryption to let users authenticate to their machine without a long, complicated passcode.

Mobile Device Management (MDM) solutions vary in scope and purpose. Some focus on productivity and app management, while others focus on security and data protection, and there are options that include elements of both. If you use an MDM solution for your business that does not have adequate security features, consider switching to or adding an effective security solution. The level of control needed for productivity and work-related functions is going to differ between organizations, but security should be a priority for everyone who intends to protect company data and comply with privacy laws.

Sign Up Now For a Free 30 Day Trial

Each day brings new laptop security challenges, so your organization needs simple and wide-reaching solutions to combat those challenges. DriveStrike is here to help you protect your most critical data with premium quality endpoint security. Sign up for a free trial to start using DriveStrike today, and contact us if you need any assistance. Our team is always ready to answer your questions.

 
DriveStrike provides robust security features that enable businesses to protect data and devices. From the DriveStrike command center, administrators can locate, lock, or remote wipe any device they manage. Other features are available depending on the operating system. DriveStrike works with Windows BitLocker to encrypt devices and manage keys. DriveStrike also provides extra options for Android device management, including device security policies and app configuration.

Encryption, TPM, and other means of protecting data can be effective against most attempts to access the machine, but with enough time, resources, and skill, expert hackers can still get through. If your laptop is stolen, the most reliable way to keep your data out of the wrong hands is by issuing a remote wipe. There is no way for a thief to access the data if it is completely erased from the machine.

What can I do to protect my laptop?

Here are a few practical steps you can take to keep your laptop secure:

  • Install DriveStrike or another remote management solution on your laptop.
  • Back up your hard drive often.
  • Do not store account passwords on your laptop or save them in your browser.
  • Encrypt your hard drive.
  • Use a TPM or complex login credentials to thwart unauthorized access.
  • Keep your laptop somewhere it cannot be seen from outside.
  • Do not leave your laptop unattended in your car or in a public place.
  • Pay attention to your surroundings and carry your laptop in a discreet bag.

My laptop has been stolen – what do I do?

Take action immediately.

  • Notify the appropriate personnel if it is a company device.
  • If you have DriveStrike installed on the laptop, initiate a remote wipe to prevent a data breach.
  • Change your account passwords and enable multifactor authentication where available.
  • File a police report.
  • Check for new logins on your accounts.

If you have more questions about laptop theft and how to stay secure, call us at 877-519-0010. DriveStrike support is available 24/7, and we are ready to help you keep your devices and data safe. Sign up for a free trial to start protecting your data today – your security is our priority.

Sign Up Now For a Free 30 Day Trial

Each day brings new laptop security challenges, so your organization needs simple and wide-reaching solutions to combat those challenges. DriveStrike is here to help you protect your most critical data with premium quality endpoint security. Sign up for a free trial to start using DriveStrike today, and contact us if you need any assistance. Our team is always ready to answer your questions.