By Colin Bartram, Director of Technology, Vector Networks (Page 6 of 6)

Asset and Data Security: the Nightmare

Recent examples, and broader survey information, include –

  • A comprehensive study by the Computer Security Institute and the FBI estimated the financial impact of the average laptop theft at over $48,000.
  • Far too many companies have no record of laptop serial numbers, making recovery near impossible even if police retrieve a haul of stolen machines. (Serial number collection is an absolute must-have for a desktop inventory tool!)
  • A laptop containing Gulf War planning information was stolen from the trunk of a car of a UK Ministry of Defence official.
  • The Chateau office building in Woodland Hills LA was raided in April 2009 and PCs and laptops taken from over 50 companies. Some of the systems included tax information, credit card information and legal documents.
  • Bord Gáis Energy reported that a burglary took place on Friday, June 5th 2009 in one of its Dublin offices. During this incident four laptops were stolen, one of which contained customer information and bank details for 75,000 Bord Gáis Energy electricity customers.

When a laptop is lost or stolen, the value attached to confidential data often far outweighs the value of the lost device. The data may have no inherent value but its confidentiality is paramount. In the last two years, the main concern regarding loss of customer information has moved from the potential for industrial espionage to the potential for identity theft. The cost of informing every individual whose confidentiality has been compromised, and the risk of class action suit from those involved, makes a $1,000 laptop containing identity information for 100,000 individuals simply a nightmare.

In today's climate of personal accountability for the protection of corporate and personal information, can any CIOs ignore the significant operational advantages and preventative benefits that can be achieved from the introduction of RFID location technology and its integration into the rest of infrastructure management?

« Previous page: RFID and the Security Challenge

« Return to the start

Old content, visit our new web site

You are viewing an old web page, please click here to view our new web site with our latest products and content. If you'd like to continue reading this content, please click here but be advised some details might be out of date.

Software Asset Management

IT Asset Management

IT Service Management

PC Remote Control


VISIT OUR NEW WEB SITE