[../htm/includes/include_top_security.htm]

Security Strategies

[../htm/includes/include_left_security.htm]

 

 

Building Piece of Mind

You work hard for your technology assets. Losing them to vandalism, theft or (as some call it) "attrition" is just not right.

A little care in developing a security strategy and making choices to provide real protection for your hard-won assets, is easy and will save a great deal of money and inconvenience down the road.

First: Define your risks. What equipment would be expensive or inconvenient if lost or stolen? What pieces are “mission-critical”? What pieces are exposed in a public access area? What contains confidential or sensitive information? What would be hard for you to replace, either because of funding or special configurations?

Second: Come up with a plan that matches your organization’s environment and budget. Some of our clients require that every piece of new equipment they purchase be secured when it is first installed. Some order security devices when they order their equipment. Others arrange installation of security cables or pads when the equipment is in place.

Some corporate and institutional managers hold users and departments responsible for any losses (or their insurance deductible) if a physical security device is not used. One even provides a set of security instructions for protecting notebook computers along with every airline ticket issued by the corporate travel office.

The most effective strategies provide a comprehensive plan, incorporating (a) asset identification and inventory, (b) personal or departmental responsibility for assets, (c) a physical security device to protect the asset when it is in the office or on the road, and (d) data protection, access control and recovery software.

 Desktop Equipment Strategies: Virtually every type of office and school equipment is vulnerable to theft. This review of the  
 physical security strategies may be helpful.
 Notebook Computers: Portable equipment presents special challenges and requires special strategies. Here are a few  
 ideas.
 iPads, Tablets and Other Mobile Devices: These new devices are ultra-portable and present special challenges to protect 
 them.
 AV Projection & Lab Equipment: Protecting AV and lab equipment, especially the newest digital projectors. Even 3D
 printers.
 Security Furniture: Workstations that protect PCs and flat panel monitors while providing a good instructional environment
 Asset tagging: Theft deterrent asset tags can identify property and help you get it back.
Flat Panel and Touch Screen Monitors: Replacing or supplementing blackboards, whiteboards and Smartboards, these valuable pieces are worth protecting with motorized tilt/swival carts and wall-mounts.

[../htm/includes/include_bottom_main_navigation.htm]

 

[../htm/includes/include_bottom_main.htm]