February 13, 2022
Nearly all marketing, PR, and corporate communications employees use a laptop for work. According to a survey by tech company Kensington, 10% of laptops get stolen in their lifetimes. And since nearly half of all laptop thefts occur in offices or classrooms, employees who work from laptops at the office must be especially weary.
Audio: Listen to this article.
Around 56% of reported computer thefts have resulted in a data breach. So, to keep your and your company’s information safe, never leave your laptop unattended in public, never turn off security tools, and immediately report your lost or stolen computer to your IT support and security desk.
Three Tasks to Help Stop Computer Theft:
- Never leave your computer unattended in public.
When you leave your computer unattended, it gives thieves an opportunity to snatch it when you aren’t looking. To help prevent this, always keep an eye on your laptop in public places.
- Never turn off or uninstall security tools.
If your computer is stolen, you want to protect the information it stores. That’s why you never want to remove any security tools to protect it. By simply having a password, Face ID, or other security tools in place on your computer, you will decrease the chance of a data breach if someone steals it.
- Report lost or stolen computers immediately.
Nearly 98% of stolen laptops are never recovered. The sooner you report your computer as lost or stolen, the more likely you are to get it back. You can lower the chances of a data breach by reporting the incident as soon as it happens.
Being aware of computer theft is only one of multiple steps to cybersecurity awareness. To expand your knowledge of cybersecurity and protect yourself digitally, make sure to set strong passwords and handle your data properly, too.
Is your company concerned about a data breach due to computer theft? A corporate communications professional at Axia Public Relations can help your company communicate internally and externally before, during, and after a data breach. Book a complimentary consultation today.
This post about computer theft is number three in a series of eight posts on cybersecurity for strategic communications professionals. Click to view the previous post "What PR pros need to know about data handling and cybersecurity awareness" or the next post "What PR pros need to know about phishing and ransomware" in the series.