You work hard for your technology assets. Losing them to vandalism, theft or (as some call it) “attrition” is just not right.
A little care in developing a security strategy and making choices to provide real protection for your hard-won assets, is easy and will save a great deal of money and inconvenience down the road.
First: Define your risks. What equipment would be expensive or inconvenient if lost or stolen? What pieces are “mission-critical”? What pieces are exposed in a public access area? What contains confidential or sensitive information? What would be hard for you to replace, either because of funding or special configurations?
Second: Come up with a plan that matches your organization’s environment and budget. Some of our clients require that every piece of new equipment they purchase be secured when it is first installed. Some order security devices when they order their equipment. Others arrange installation of security cables or pads when the equipment is in place.
Some corporate and institutional managers hold users and departments responsible for any losses (or their insurance deductible) if a physical security device is not used. One even provides a set of security instructions for protecting notebook computers along with every airline ticket issued by the corporate travel office.
The most effective strategies provide a comprehensive plan, incorporating (a) asset identification and inventory, (b) personal or departmental responsibility for assets, (c) a physical security device to protect the asset when it is in the office or on the road, and (d) data protection, access control and recovery software.