SlideShare a Scribd company logo
1 of 16
Download to read offline
Laptop theft statistics

 A scary but helpful guide for IT managers
In the lifetime of every laptop there’s a 1 in
        10 chance that it will get stolen.
Statistics show that as many as one in ten laptops
 will be stolen or lost from an organisation over
            the lifetime of each computer


  That’s 10% of your colleagues and co-workers
    knocking on your door for a replacement
                    machine
This dismal scenario is extremely common. Around 90%
               of organisations are affected
IDC research shows that the office is the most likely place
                  for a thief to strike
86% of IT security practitioners report that
someone in their organization has had a laptop
                 lost or stolen



56% report that it resulted in a data breach
59% of business managers surveyed agree that
 encryption stops cyber criminals from stealing
   data on laptops versus 46% of IT security
   practitioners who strongly agree or agree
65% of business managers surveyed record their
encryption password on a private document such
as a post-it note to jog their memory or share the
             key with other individuals
50% of business managers have disengaged their
           laptop’s encryption solution




40% admit this is in violation of their company’s
                  security policy
52% of business managers sometimes or often
leave their laptop with a stranger when travelling
1 in 10 laptops are stolen in the lifetime of the
         laptop (usually around 3 years)
89% of companies experience laptop loss
It takes average of 9 days to get fully
      operational after laptop loss
The average total cost to a business from laptop
  loss is $47,000 (including downtime, support
             & management time etc)
Only 25% of
laptops have data
  encryption and
 50% of business
  managers with
encryption switch
       it off
1 in 10 business laptops gets stolen.
    The result can be catastrophic
Learn more about physical security now and get
            protected against theft!

      Download the 16 page whitepaper
Image credits

Slide 3 http://skincitysl.com/
Slide 4 :
http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/
lightbox/
Slide 6: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation-
Caricatures-Office-Worker.html
Slide 6: http://www.fastcharacters.com/character-design/cartoon-business-man/
Slide: 7
http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2
978822643/lightbox/
Slide 9: http://www.singlesolution.com/blog/page/2/
Slide 10 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for-
christmas.html
Slide 11: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed-
people&page=6
Slide 12: http://www.justcalendar.org/calendar/calendar.jpg
Slide 13: http://www.plrinternetmarketing.com/blogging/want-to-get-started-
making-money-blogging/
Slide 14: http://www.pspsps.tv/2008/06/

More Related Content

What's hot

Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
THE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIES
THE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIESTHE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIES
THE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIESMichael Daniels
 
NIR (Negros Island Region) Region XVIII
NIR (Negros Island Region) Region XVIIINIR (Negros Island Region) Region XVIII
NIR (Negros Island Region) Region XVIIINaval State University
 
Tourism Planning & Development: Region iva - CALABARZON
Tourism Planning & Development: Region iva - CALABARZONTourism Planning & Development: Region iva - CALABARZON
Tourism Planning & Development: Region iva - CALABARZONMary Grace Mancao
 
Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...
Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...
Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...Associate Professor in VSB Coimbatore
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)Sharwin Calimlim
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenKenneth Malte
 
LFP outperforms NMC lithium batteries
LFP outperforms NMC lithium batteriesLFP outperforms NMC lithium batteries
LFP outperforms NMC lithium batteriesOneCharge
 
Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...
Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...
Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...Yole Developpement
 
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole DeveloppementYole Developpement
 

What's hot (20)

Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Fs chapter 1-5_edited
Fs chapter 1-5_editedFs chapter 1-5_edited
Fs chapter 1-5_edited
 
THE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIES
THE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIESTHE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIES
THE IMPORTANCE OF POLICE TRAINING AND IT'S AFFECT ON COMMUNITIES
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
NIR (Negros Island Region) Region XVIII
NIR (Negros Island Region) Region XVIIINIR (Negros Island Region) Region XVIII
NIR (Negros Island Region) Region XVIII
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Tourism Planning & Development: Region iva - CALABARZON
Tourism Planning & Development: Region iva - CALABARZONTourism Planning & Development: Region iva - CALABARZON
Tourism Planning & Development: Region iva - CALABARZON
 
R E G I O N I V A
R E G I O N  I V  AR E G I O N  I V  A
R E G I O N I V A
 
Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...
Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...
Level of Effectiveness of the Barangay Peacekeeping Action Team in Relation t...
 
Ministry of ICT presentation
Ministry of ICT presentationMinistry of ICT presentation
Ministry of ICT presentation
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
 
LFP outperforms NMC lithium batteries
LFP outperforms NMC lithium batteriesLFP outperforms NMC lithium batteries
LFP outperforms NMC lithium batteries
 
Fingerpori
FingerporiFingerpori
Fingerpori
 
Region 1
Region 1 Region 1
Region 1
 
Utility Fog
Utility FogUtility Fog
Utility Fog
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...
Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...
Bosch Mid Range Radar (MRR) Sensor - teardown reverse costing report publishe...
 
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
 

Similar to Laptop theft statistics

Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber AttacksInuit AB
 
Watch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicWatch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicRandolph Novino
 
Data at-risk-infographic-v8-tall
Data at-risk-infographic-v8-tallData at-risk-infographic-v8-tall
Data at-risk-infographic-v8-tallDavid Stoltenberg
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp
 
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...Symbiosis Group
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryHuman Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryCR Group
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirateswebnowires
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Nonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkNonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkHolly Ross
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseJim Porell
 
Will factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxWill factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxVirha Tiku
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxDCEISO580thACWW
 

Similar to Laptop theft statistics (20)

Laptop physical security
Laptop physical securityLaptop physical security
Laptop physical security
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber Attacks
 
Watch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicWatch Guard Firebox T10 Infographic
Watch Guard Firebox T10 Infographic
 
Data at-risk-infographic-v8-tall
Data at-risk-infographic-v8-tallData at-risk-infographic-v8-tall
Data at-risk-infographic-v8-tall
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
 
Netgear router error codes
Netgear router error codesNetgear router error codes
Netgear router error codes
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryHuman Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Nonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkNonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the Network
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Will factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxWill factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docx
 
3 steps security
3 steps security3 steps security
3 steps security
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Laptop theft statistics

  • 1. Laptop theft statistics A scary but helpful guide for IT managers In the lifetime of every laptop there’s a 1 in 10 chance that it will get stolen.
  • 2. Statistics show that as many as one in ten laptops will be stolen or lost from an organisation over the lifetime of each computer That’s 10% of your colleagues and co-workers knocking on your door for a replacement machine
  • 3. This dismal scenario is extremely common. Around 90% of organisations are affected
  • 4. IDC research shows that the office is the most likely place for a thief to strike
  • 5. 86% of IT security practitioners report that someone in their organization has had a laptop lost or stolen 56% report that it resulted in a data breach
  • 6. 59% of business managers surveyed agree that encryption stops cyber criminals from stealing data on laptops versus 46% of IT security practitioners who strongly agree or agree
  • 7. 65% of business managers surveyed record their encryption password on a private document such as a post-it note to jog their memory or share the key with other individuals
  • 8. 50% of business managers have disengaged their laptop’s encryption solution 40% admit this is in violation of their company’s security policy
  • 9. 52% of business managers sometimes or often leave their laptop with a stranger when travelling
  • 10. 1 in 10 laptops are stolen in the lifetime of the laptop (usually around 3 years)
  • 11. 89% of companies experience laptop loss
  • 12. It takes average of 9 days to get fully operational after laptop loss
  • 13. The average total cost to a business from laptop loss is $47,000 (including downtime, support & management time etc)
  • 14. Only 25% of laptops have data encryption and 50% of business managers with encryption switch it off
  • 15. 1 in 10 business laptops gets stolen. The result can be catastrophic Learn more about physical security now and get protected against theft! Download the 16 page whitepaper
  • 16. Image credits Slide 3 http://skincitysl.com/ Slide 4 : http://www.flickr.com/photos/mkosut/3631119830/#/photos/mkosut/3631119830/ lightbox/ Slide 6: http://personalisedgift.org.uk/product/5/278/Personalised-Occupation- Caricatures-Office-Worker.html Slide 6: http://www.fastcharacters.com/character-design/cartoon-business-man/ Slide: 7 http://www.flickr.com/photos/isabellewong/2978822643/#/photos/isabellewong/2 978822643/lightbox/ Slide 9: http://www.singlesolution.com/blog/page/2/ Slide 10 http://www.topnotebookcomputers.co.cc/2010/11/top-10-laptops-for- christmas.html Slide 11: http://nsplprojects.com/SRProducts/administrator/pictures-of-stressed- people&page=6 Slide 12: http://www.justcalendar.org/calendar/calendar.jpg Slide 13: http://www.plrinternetmarketing.com/blogging/want-to-get-started- making-money-blogging/ Slide 14: http://www.pspsps.tv/2008/06/