SlideShare a Scribd company logo
1 of 111
Laptop physical security  A scary but helpful guide for IT managers  In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer  	That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
This dismal scenario is extremely common. Around 90% of organisations are affected
Laptop TheftQ. Has your organisation, or any of your employees, experienced laptop theft or loss
The top seven excuses your colleagues will use are:  We were burgled
The top seven excuses your colleagues will use are:  2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
The top seven excuses your colleagues will use are:  		3. I was only away for a minute
The top seven excuses your colleagues will use are:  4. I left it in the car
The top seven excuses your colleagues will use are:  5. I thought it would be safe
The top seven excuses your colleagues will use are:  	6. I asked the person next to me to watch my stuff –  he looked really trustworthy
The top seven excuses your colleagues will use are:  	7. It was on my desk – then it was gone
Most theft is  Opportunistic Once reformatted, stolen laptops are difficult to spot  Most laptops - 58% - are stolen from work Thieves usually steal laptops for their resale value rather than for the data Laptops are easy to sell anonymously over the internet
IDC research shows that the office is the most likely place for a thief to strike
Where your laptops WILL BE stolen from:
86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen  56% report that it resulted in a data breach
59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
52% of business managers sometimes or often leave their laptop with a stranger when travelling
1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
89% of companies experience laptop loss
It takes average of 9 days to get fully operational after laptop loss
The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
Business problems you can avoid by using laptop locks  Loss of  reputation
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  		Risk of industrial  			espionage
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage Reduce the likelihood  			of identity theft
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage  		Reduce the likelihood of identity theft  Losing customers
Business problems you can avoid by using laptop locks  Loss of reputation  Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”  Risk of being fined by your regulatory body  Risk of industrial espionage  Reduce the likelihood of identity theft  Losing customers  Having to tell your customer you lost their data because you were careless
Theft PreventionQ. What proportion of laptop theft do you believe would not have occurred if a cable lock had been used?
The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft is $47,000 for larger organisations  – some of which can have over 1,000 laptops..
IDC suggests that organisations typically underestimate the cost of laptop theft by over 30% particularly the cost of downtime
And remember you’ll only ever get  3%  of the lost or stolen laptops back
7 common misconceptions  1. Encryption is the way forward
1. Encryption is the way forward.  Company policies now routinely stipulate that any data leaving an office must be encrypted  Around 50% of executives turn off encryption on their laptops if they can Encryption can never stop someone walking off with a laptop
7 common misconceptions  2. Better door security in the office is the  answer
	2. Better door security in the office is the answer  	Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter  	Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
7 common misconceptions  3. It won’t happen to me or my employees
	3. It won’t happen to me or my employees A typical business laptop lasts for 3.1 years 	Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
7 common misconceptions  4. I can recover the data
	4. I can recover the data.  	On average it will take you nine days to replace a laptop – so you’ll certainly have time to try  35% of companies have never tried to successfully restore from their back up, so it might not work at all
7 common misconceptions  		5. Cable locks are ugly and fiddly
	5. Cable locks are ugly and fiddly...  	Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
7 common misconceptions  6. Nobody like using laptop locks
	6. Nobody like using laptop locks. 	Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
7 common misconceptions  7. My employees simply won’t use laptop locks
	7. My employees simply won’t use laptop locks.  	They certainly will if you make the consequences of not using them serious enough 	Introducing cultural change into any organisation can take effort, but there’s a tipping point after which it becomes more natural to embrace the change than to fight it
How to prevent laptop theft  Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves A laptop lock is the front line of defence
How to prevent laptop theft  Add a clause to your HR or company policy to give people the right incentive to use a lock
How to prevent laptop theft  	Give colleagues brief training in theft awareness when you hand them out a lock
How to prevent laptop theft  	Ask employees not to leave their laptops in unattended cars
How to prevent laptop theft  	Insist and make it a disciplinary matter – your business and reputation is certainly worth it
How to prevent laptop theft  Tell employees to use a lock when they are  o At home
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office  o In a coffee shop
How to prevent laptop theft  Tell employees to use a lock when they are  o At home  o In a hotel  o In the office  o In a coffee shop  o At a conference or training course
What to do if your laptop does get stolen  Think of a great excuse (because there is no justifiable reason)
What to do if your laptop does get stolen  Tellyour boss and then take one step back and wait for the answer
What to do if your laptop does get stolen  TellIT and then take one step back and wait for the answer
What to do if your laptop does get stolen  Tell your customers and then take one step back and wait for the answer
What to do if your laptop does get stolen  Tell your shareholders and then take one step back and wait for the answer
What to do if your laptop does get stolen  Report it to the police (you’ll be amongst others who made the same mistake)
What to do if your laptop does get stolen  For some of you – start looking for a new job
What to do if your laptop does get stolen  For some of you – change all your passwords
What to do if your laptop does get stolen  Ask friends for photos they may have as copies of the ones you just lost
What to do if your laptop does get stolen  Feign insanity
What to do if your laptop does get stolen  Beg IT to get you another one fast
What to do if your laptop does get stolen  Start rewriting the urgent report you just lost
What to do if your laptop does get stolen  Request an expense authorisation for a new laptop
General  Don't leave laptops unattended and always lock
General  Don't allow anyone else to use your laptop — it is company equipment and provides access to our networks
General  If left at work overnight, lock out of sight
General  Choose an ordinary looking briefcase or non-traditional laptop carry bag Bags that obviously contain computers are an easily identifiable target for the casual thief
At Home  Always store inside your home, never leave in the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard or strong drawer
At Home  When it is not possible to lock away, use your supplied T-bar lock attaching to either an immoveable object or to something that is difficult or heavy to carry
At Home  Do not allow any use that is not authorised by The Company
At Home  Onlyconnect to approved or known wireless networks Ideally use your encrypted domestic connection if available
In the Car  Your laptop will be safer if it is not left in the car at all
In the Car  If absolutely necessary, lock out of sight in the boot
In the Car  If you expect to leave your laptop in the car regularly, speak to the helpdesk and ask about additional security measures  ,[object Object],[object Object]
In the Car  While the vehicle is in motion, your laptop should be stored in its carry bag  ,[object Object],[object Object]
Public Transport and Public Places.  Laptops are particularly vulnerable to theft and loss while using public transport
Public Transport and Public Places.  Do not use your laptop while travelling unless necessary
Public Transport and Public Places.  Never leave unattended and never allow anyone else to use your laptop
Public Transport and Public Places.  Be aware of your surroundings  ,[object Object],[object Object]
Public Transport and Public Places.  Only connect to approved or known wireless networks
Hotels, Conference and Meeting Rooms  Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
Hotels, Conference and Meeting Rooms  In conference and meeting rooms, use your T-bar lock
Data Protection Responsibilities  Always use encryption software approved and supplied by The Company
Data Protection Responsibilities  Choose a password that is unique to your data-encryption key; make it long, random and complicated to guess
Data Protection Responsibilities  Do not give your network password or token/access device to anyone ,[object Object],[object Object]
Data Protection Responsibilities  Your laptop is the property of The Company; do not lend it to anyone
Data Protection Responsibilities  If you leave your laptop switched on and unattended you must activate the password-protected screensaver ,[object Object],[object Object]
Malware Responsibilities  The Company provides all laptop users with pre-installed antivirus software Make sure you know how to access and use this software. Call the helpdesk for advice if needed
Malware Responsibilities  If you do not have regular access to The Company's network then you will not receive regular antivirus updates Make sure you log on to the company network at least once a week
Malware Responsibilities  Always scan files for viruses Your email is automatically scanned for you as are files from the company network If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
Malware Responsibilities  Do not open any email attachments unless they were expected and from a trusted source Email attachments are the number-one malware risk
Malware Responsibilities  Do not download any software. If you need a different or more current application, contact the helpdesk for advice Most permitted applications are updated automatically for you when you log into the company network
Malware Responsibilities  If you suspect a virus attack, contact the helpdesk immediately Do not access the company network or back up files until your laptop has been inspected
1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
Sources  *http://intel.ly/mkvRrl  **http://bit.ly/jN3RHl  http://clicksafe.kensington.com/laptop-physical-security-a-scary-but-helpful-guide-for-it-managers/ http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
Image credit Slide 3 http://skincitysl.com/ Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html Slide 6: http://triutami1359.blogspot.com/ Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/ Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/ Slide 9: http://themensgiftguide.com/blog/?p=355 Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/ Slide 11: http://www.hodson-office.co.uk/ Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/ Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/ Slide 19: http://www.singlesolution.com/blog/page/2/ Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6 Slide 22: http://www.justcalendar.org/calendar/calendar.jpg Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/ Slide 24: http://www.pspsps.tv/2008/06/ Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/ Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/ Slide 28: http://uk.askmen.com/money/keywords/espionage.html Slide 29: http://www.americanbadbusinesslist.com/identity-theft/ Slide 30: http://www.uktranslation.co.uk/ Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/ Slide 42: http://www.recover-lost-data.co.uk/ Slide 44: http://www.vibrant.com/cable-messes.php Slide 48: http://inchatatime.blogspot.com/2007_11_01_archive.html Slide 52: http://speechempoweredcomputing.co.uk/Newsletter/ Slide 53: http://news.bbc.co.uk/1/hi/8220274.stm Slides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.html Slides 81- 86:  http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=Keywords Slides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/ Slides 101-107: http://www.malware-help.com/ Slide 95- 100:  http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx
Laptop physical security
Laptop physical security
Laptop physical security
Laptop physical security
Laptop physical security

More Related Content

Similar to Laptop physical security

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer SecureNiall Roche
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
What does Glen Tupling do?
What does Glen Tupling do?What does Glen Tupling do?
What does Glen Tupling do?gtupling
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminAntonio Sanz Alcober
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And SecureRob Clement
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech SupportHoward Page
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Ron Pierce
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 

Similar to Laptop physical security (20)

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer Secure
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
What does Glen Tupling do?
What does Glen Tupling do?What does Glen Tupling do?
What does Glen Tupling do?
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech Support
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 

Recently uploaded

NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil Baba Dawood bangali
 
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作f3774p8b
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls in Delhi
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一C SSS
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightKomal Khan
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...Amil Baba Dawood bangali
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程1k98h0e1
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...Amil baba
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...ttt fff
 
NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...
NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...
NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...Amil baba
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxLeaMaePahinagGarciaV
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一C SSS
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一diploma 1
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRdollysharma2066
 

Recently uploaded (20)

NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun Tonight
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
 
NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...
NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...
NO1 Certified Vashikaran Specialist in Uk Black Magic Specialist in Uk Black ...
 
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptx
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
 

Laptop physical security

  • 1. Laptop physical security A scary but helpful guide for IT managers In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
  • 2. Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
  • 3. This dismal scenario is extremely common. Around 90% of organisations are affected
  • 4. Laptop TheftQ. Has your organisation, or any of your employees, experienced laptop theft or loss
  • 5. The top seven excuses your colleagues will use are: We were burgled
  • 6. The top seven excuses your colleagues will use are: 2. I was at a conference, I turned my back to talk to someone and, pow, it was gone
  • 7. The top seven excuses your colleagues will use are: 3. I was only away for a minute
  • 8. The top seven excuses your colleagues will use are: 4. I left it in the car
  • 9. The top seven excuses your colleagues will use are: 5. I thought it would be safe
  • 10. The top seven excuses your colleagues will use are: 6. I asked the person next to me to watch my stuff – he looked really trustworthy
  • 11. The top seven excuses your colleagues will use are: 7. It was on my desk – then it was gone
  • 12. Most theft is Opportunistic Once reformatted, stolen laptops are difficult to spot Most laptops - 58% - are stolen from work Thieves usually steal laptops for their resale value rather than for the data Laptops are easy to sell anonymously over the internet
  • 13. IDC research shows that the office is the most likely place for a thief to strike
  • 14. Where your laptops WILL BE stolen from:
  • 15. 86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen 56% report that it resulted in a data breach
  • 16. 59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
  • 17. 65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
  • 18. 50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
  • 19. 52% of business managers sometimes or often leave their laptop with a stranger when travelling
  • 20. 1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
  • 21. 89% of companies experience laptop loss
  • 22. It takes average of 9 days to get fully operational after laptop loss
  • 23. The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
  • 24. Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
  • 25. Business problems you can avoid by using laptop locks Loss of reputation
  • 26. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive”
  • 27. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body
  • 28. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage
  • 29. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft
  • 30. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft Losing customers
  • 31. Business problems you can avoid by using laptop locks Loss of reputation Loss of valuable and sensitive data: more than 50% of laptops contain data described by owners or users as “sensitive” Risk of being fined by your regulatory body Risk of industrial espionage Reduce the likelihood of identity theft Losing customers Having to tell your customer you lost their data because you were careless
  • 32. Theft PreventionQ. What proportion of laptop theft do you believe would not have occurred if a cable lock had been used?
  • 33. The Ponemon Research paper published in 2010 said that on average the cost of a laptop theft is $47,000 for larger organisations – some of which can have over 1,000 laptops..
  • 34. IDC suggests that organisations typically underestimate the cost of laptop theft by over 30% particularly the cost of downtime
  • 35. And remember you’ll only ever get 3% of the lost or stolen laptops back
  • 36. 7 common misconceptions 1. Encryption is the way forward
  • 37. 1. Encryption is the way forward. Company policies now routinely stipulate that any data leaving an office must be encrypted Around 50% of executives turn off encryption on their laptops if they can Encryption can never stop someone walking off with a laptop
  • 38. 7 common misconceptions 2. Better door security in the office is the answer
  • 39. 2. Better door security in the office is the answer Unless you have a trusty doorman who knows every employee and visitor by name, this approach is a non-starter Most electronic systems are ripe for abuse. Tailgating, where a second person goes through a door meant for only one person at a time, is a constant menace in companies of all sizes
  • 40. 7 common misconceptions 3. It won’t happen to me or my employees
  • 41. 3. It won’t happen to me or my employees A typical business laptop lasts for 3.1 years Most theft is indiscriminate and some 10% of laptops will be pinched during their busy, yet sadly brief, lives
  • 42. 7 common misconceptions 4. I can recover the data
  • 43. 4. I can recover the data. On average it will take you nine days to replace a laptop – so you’ll certainly have time to try 35% of companies have never tried to successfully restore from their back up, so it might not work at all
  • 44. 7 common misconceptions 5. Cable locks are ugly and fiddly
  • 45. 5. Cable locks are ugly and fiddly... Wrong. New devices like the Kensington ClickSafe have small, sleek barrels and can be fitted to your laptops in less than five seconds
  • 46. 7 common misconceptions 6. Nobody like using laptop locks
  • 47. 6. Nobody like using laptop locks. Previous physical security devices like laptop locks have been chunky. With the new generation devices, all that has changed. They’re simple to use, too
  • 48. 7 common misconceptions 7. My employees simply won’t use laptop locks
  • 49. 7. My employees simply won’t use laptop locks. They certainly will if you make the consequences of not using them serious enough Introducing cultural change into any organisation can take effort, but there’s a tipping point after which it becomes more natural to embrace the change than to fight it
  • 50. How to prevent laptop theft Get everyone with a laptop, whether they travel or not, a physical visual deterrent to thieves A laptop lock is the front line of defence
  • 51. How to prevent laptop theft Add a clause to your HR or company policy to give people the right incentive to use a lock
  • 52. How to prevent laptop theft Give colleagues brief training in theft awareness when you hand them out a lock
  • 53. How to prevent laptop theft Ask employees not to leave their laptops in unattended cars
  • 54. How to prevent laptop theft Insist and make it a disciplinary matter – your business and reputation is certainly worth it
  • 55. How to prevent laptop theft Tell employees to use a lock when they are o At home
  • 56. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel
  • 57. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office
  • 58. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop
  • 59. How to prevent laptop theft Tell employees to use a lock when they are o At home o In a hotel o In the office o In a coffee shop o At a conference or training course
  • 60. What to do if your laptop does get stolen Think of a great excuse (because there is no justifiable reason)
  • 61. What to do if your laptop does get stolen Tellyour boss and then take one step back and wait for the answer
  • 62. What to do if your laptop does get stolen TellIT and then take one step back and wait for the answer
  • 63. What to do if your laptop does get stolen Tell your customers and then take one step back and wait for the answer
  • 64. What to do if your laptop does get stolen Tell your shareholders and then take one step back and wait for the answer
  • 65. What to do if your laptop does get stolen Report it to the police (you’ll be amongst others who made the same mistake)
  • 66. What to do if your laptop does get stolen For some of you – start looking for a new job
  • 67. What to do if your laptop does get stolen For some of you – change all your passwords
  • 68. What to do if your laptop does get stolen Ask friends for photos they may have as copies of the ones you just lost
  • 69. What to do if your laptop does get stolen Feign insanity
  • 70. What to do if your laptop does get stolen Beg IT to get you another one fast
  • 71. What to do if your laptop does get stolen Start rewriting the urgent report you just lost
  • 72. What to do if your laptop does get stolen Request an expense authorisation for a new laptop
  • 73. General Don't leave laptops unattended and always lock
  • 74. General Don't allow anyone else to use your laptop — it is company equipment and provides access to our networks
  • 75. General If left at work overnight, lock out of sight
  • 76. General Choose an ordinary looking briefcase or non-traditional laptop carry bag Bags that obviously contain computers are an easily identifiable target for the casual thief
  • 77. At Home Always store inside your home, never leave in the car and keep where it cannot be easily seen from outside. Ideally, keep locked in a cupboard or strong drawer
  • 78. At Home When it is not possible to lock away, use your supplied T-bar lock attaching to either an immoveable object or to something that is difficult or heavy to carry
  • 79. At Home Do not allow any use that is not authorised by The Company
  • 80. At Home Onlyconnect to approved or known wireless networks Ideally use your encrypted domestic connection if available
  • 81. In the Car Your laptop will be safer if it is not left in the car at all
  • 82. In the Car If absolutely necessary, lock out of sight in the boot
  • 83.
  • 84.
  • 85. Public Transport and Public Places. Laptops are particularly vulnerable to theft and loss while using public transport
  • 86. Public Transport and Public Places. Do not use your laptop while travelling unless necessary
  • 87. Public Transport and Public Places. Never leave unattended and never allow anyone else to use your laptop
  • 88.
  • 89. Public Transport and Public Places. Only connect to approved or known wireless networks
  • 90. Hotels, Conference and Meeting Rooms Avoid leaving laptops in hotel rooms. Use the hotel safe and get a receipt. If absolutely necessary, use your T-bar lock
  • 91. Hotels, Conference and Meeting Rooms In conference and meeting rooms, use your T-bar lock
  • 92. Data Protection Responsibilities Always use encryption software approved and supplied by The Company
  • 93. Data Protection Responsibilities Choose a password that is unique to your data-encryption key; make it long, random and complicated to guess
  • 94.
  • 95. Data Protection Responsibilities Your laptop is the property of The Company; do not lend it to anyone
  • 96.
  • 97. Malware Responsibilities The Company provides all laptop users with pre-installed antivirus software Make sure you know how to access and use this software. Call the helpdesk for advice if needed
  • 98. Malware Responsibilities If you do not have regular access to The Company's network then you will not receive regular antivirus updates Make sure you log on to the company network at least once a week
  • 99. Malware Responsibilities Always scan files for viruses Your email is automatically scanned for you as are files from the company network If you are given a file on a disk, USB key etc, scan the disk and/or file for viruses
  • 100. Malware Responsibilities Do not open any email attachments unless they were expected and from a trusted source Email attachments are the number-one malware risk
  • 101. Malware Responsibilities Do not download any software. If you need a different or more current application, contact the helpdesk for advice Most permitted applications are updated automatically for you when you log into the company network
  • 102. Malware Responsibilities If you suspect a virus attack, contact the helpdesk immediately Do not access the company network or back up files until your laptop has been inspected
  • 103. 1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
  • 104. Sources *http://intel.ly/mkvRrl **http://bit.ly/jN3RHl http://clicksafe.kensington.com/laptop-physical-security-a-scary-but-helpful-guide-for-it-managers/ http://clicksafe.kensington.com/blog/bid/55013/7-misconceptions-about-physical-laptop-security
  • 105. Image credit Slide 3 http://skincitysl.com/ Slide 5 http://weirdworldwebnews.blogspot.com/2009/08/bank-employee-nabs-robber-but-loses-job.html Slide 6: http://triutami1359.blogspot.com/ Slide 7: http://www.flickr.com/photos/diseno3d/3865108573/#/photos/diseno3d/3865108573/lightbox/ Slide 8: http://www.flickr.com/photos/rbpdesigner/4096002087/#/photos/rbpdesigner/4096002087/lightbox/ Slide 9: http://themensgiftguide.com/blog/?p=355 Slide 10: http://www.protouchblog.co.uk/2009/05/self-service-kiosks-help-or-hindrance-to-the-industry/ Slide 11: http://www.hodson-office.co.uk/ Slide 13 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/lightbox/ Slide 16: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-Caricatures-Office-Worker.html Slide 16: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide 17: http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2978822643/lightbox/ Slide 19: http://www.singlesolution.com/blog/page/2/ Slide 20 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-christmas.html Slide 21: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-people&page=6 Slide 22: http://www.justcalendar.org/calendar/calendar.jpg Slide 23: http://www.plrinternetmarketing.com/blogging/want-to-get-started-making-money-blogging/ Slide 24: http://www.pspsps.tv/2008/06/ Slide 25: http://www.soxfirst.com/50226711/strategic_corporate_reputation.php Slide 26: http://westernthm.wordpress.com/2011/04/21/the-messianic-secret-early-fabrication-or-historical-reality/ Slide 27: http://medicallicenseverification.com/2010/08/09/usa-navy-doctor-arrested-and-fined/ Slide 28: http://uk.askmen.com/money/keywords/espionage.html Slide 29: http://www.americanbadbusinesslist.com/identity-theft/ Slide 30: http://www.uktranslation.co.uk/ Slide 36: http://www.codinghorror.com/blog/2007/03/creating-user-friendly-404-pages.html Slide 38: http://catholicismpure.wordpress.com/2011/03/19/the-night-watchman/
  • 106. Slide 40: http://mappingcompanysuccess.com/2008/02/quote-day-at-leadership-turn/ Slide 42: http://www.recover-lost-data.co.uk/ Slide 44: http://www.vibrant.com/cable-messes.php Slide 48: http://inchatatime.blogspot.com/2007_11_01_archive.html Slide 52: http://speechempoweredcomputing.co.uk/Newsletter/ Slide 53: http://news.bbc.co.uk/1/hi/8220274.stm Slides 77-80: http://jessthebee.blogspot.com/2010/11/home-sweet-home.html Slides 81- 86: http://www.trybuysoftware.co.uk/list.php?string=sport+car&match=Exact&search=Keywords Slides 87-92: http://www.bestraveltips.com/travel-tips-for-europe-train/ Slides 101-107: http://www.malware-help.com/ Slide 95- 100: http://www.connexionslive.com/AboutConnexions/Legal/DataProtection/Default.aspx