Security Strategies

 

First: Define your risks.  What equipment would be expensive or inconvenient if lost or stolen?  What pieces are “mission-critical”?  What pieces are exposed in a public access area?  What contains confidential or sensitive information?  What would be hard for you to replace, either because of funding or special configurations?

Second: Come up with a plan that matches your organization’s environment and budget. Some of our clients require that every piece of new equipment they purchase be secured when it is first installed. Some order security devices when they order their equipment. Others arrange installation of security cables or pads when the equipment is in place.

Some corporate and institutional managers hold users and departments responsible for any losses (or their insurance deductible) if a physical security device is not used. One even provides a set of security instructions for protecting notebook computers along with every airline ticket issued by the corporate travel office.

The most effective strategies provide a comprehensive plan, incorporating (a) asset identification and inventory, (b) personal or departmental responsibility for assets, (c) a physical security device to protect the asset when it is in the office or on the road, and (d) data protection, access control and recovery software.

Desktop equipment strategies: Virtually every type of office and school equipment is vulnerable to theft. This review of the physical security strategies may be helpful.
Notebook and laptop computers: Portable equipment presents special challenges and requires special strategies. Here are a few ideas.
iPads, Tablets and eReaders: These new devices are ultra-portable and present special challenges to protect them.
Netbooks: Small, inexpensive and ultra portable, netbooks are still worth protecting.
AV Projection & Lab Equipment: Protecting AV and lab equipment, especially the newest digital projectors
Security Furniture: Workstations that protect PCs and flat panel monitors while providing a good instructional environment
Asset tagging: Theft deterrent asset tags can identify property and help you get it back.
Recovery systems: A kind of LoJak™ for laptop and desktop PCs
[http://www.pc-security.com/htm/includes/include_bottom_main_navigation.htm]
 


What's Hot | Security Strategies | Product Solutions | Industry Strategies
Home | About Us | Search | Datamation Systems - Technical Support

 

Datamation Systems, Inc.
Send general e-mail to Datamation Systems  with questions or comments about this web site. For technical issues please contact our Company Webmaster.
Copyright © 2011 Datamation Systems, Inc. - All rights reserved. 125 Louis Street, South Hackensack, NJ 07606-1733 - USA
Tel: 201-329-7200 Fax: 201-329-7272  -  Revised: Thursday, March 13, 2014