Reacting to Laptop Theft

Laptop theft is a significant threat to users of laptop computers. Organizations can loose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive corporate data and personal information. The Computer Security Institute/FBI Computer Crime & Security Survey found the average theft of a laptop to cost a company is $89,000.

 

Most of the cost in this case is not the laptop hardware as you can see. Laptop  is only about 1% of the total cost. The most important assets we need to restore are user data and corporate confidentiallity.A smart strategy to laptop theft is to react dynamicaly and treat it as a computer replacement scenario. Accepting that the laptop theft is a known security risk, what can we do resume user productivity with minimum cost and damage.

 

Data Protection and Resume of Business

  • Protection and confidentiallity of corporate data 
  • Dynami provisioning of new hardware
  • Instant availability of user state to resume business
  • Instant availability of user applications to resume business

Strong Authentication and Drive Encryption

If a user’s laptop is protected with strong authentication and drive encryption, the data will protected from unauthorized access.

Folder Redirection

Folder Redirection type technologies will ensure the data is still available to the user since it is stored on a network server and can be backed up centrally. Once the user receives a new PC, upon logging onto the network the data is automatically synchronized down to the local hard drive so it is always accessible, even when on the road.

Application Virtualization

Technologies like Microsoft Application Virtualization (App-V) will automatically deliver all the user’s assigned corporate applications along with their application settings without any local installation required. Roaming User Profiles also makes sure application settings, system settings and other customizations follow the user to the new PC. If the laptop is lost, stolen or no longer functional App-V can quickly make the users applications available to them on their new system. No installation from CD, no waiting hours for application install.

VDI

For highly critical data used bymobile devices, its suggested to consider technologies like Hosted Virtual Desktops to ensure data security while accessing from remote

.

Data Classification

An important dependency for mobile data protection is data classification. Its crucial to classify the data first before implementing any mobile data protection solutions. Companies which do not have any data classification program in place will struggle with their data protection projects.

Data Classification