Lost & Stolen Device | Cybersecurity Insights #10

Описание к видео Lost & Stolen Device | Cybersecurity Insights #10

With a highly mobile and increasingly global workforce, lost, missing, or stolen devices are an unfortunate reality. Visit https://www.absolute.com/blog/how-to-... to learn more.

It’s estimated that 35% of laptops, tablets, and mobile phones contain sensitive corporate data. What happens when one goes missing?

This episode talks about an uncomfortable, but all-too-common subject – lost/stolen devices. Whether it be a lost computer, stolen computer, or any other type of device, there are steps you can take to protect your organization from further risk exposure and prevent data breaches.

Tracking a lost device is the crucial first step to locating it. Pinpoint where it is, then start investigating what’s on it. With good endpoint cyber hygiene and automated response, you can secure the lost/stolen device and take action to recover it.

It’s not fun to think about, but unfortunately, having a device lost or stolen is typically a matter of when, not if. Millions of laptops are stolen each year and the cost to companies can be in the millions of dollars. It isn’t just about the cost of the hardware but missing devices also result in a loss of employee productivity and morale and— if the laptop had customer or patient data on it —it puts the company at significant risk. So the question isn’t what do if a laptop (or other device) goes missing but:

Do you have a plan in place for tracking and monitoring all of your devices, both new and old? And when a device goes missing, how do you protect the data on it? Read our blog post to learn more: "How to Protect Your Data If a Laptop is Lost or Stolen": https://www.absolute.com/blog/how-to-...

Absolute provides unparalleled visibility and control over lost and stolen devices. With firmware that is embedded in devices at the factory, you have an unbreakable digital tether that streams asset intelligence into a single cloud-based console. Use Absolute to track lost computers, pinpoint exposures, and prioritize actions.

----

Find out more about how Absolute Software can help you maintain your endpoint security: https://www.absolute.com/?utm_medium=...

Find out more about Absolute Home & Office - the standard in data protection and theft recovery, with the only Investigations team that both locates your stolen device and gets it back to you: https://homeoffice.absolute.com/?utm_...

----

Watch more episodes of the Cybersecurity Insights series:
#1 - HIPAA Privacy Rule -    • HIPAA Privacy Rule | Cybersecurity In...  
#2 - HIPAA Security Rule:    • HIPAA Security Rule | Cybersecurity I...  
#3 - HITRUST Cybersecurity Framework:    • HITRUST Cybersecurity Framework | Cyb...  
#4 - NIST Cybersecurity Framework:    • NIST Cybersecurity Framework Explaine...  
#5 - NIST CSF - Identify:    • NIST CSF - Identify | Cybersecurity I...  
#6 - NIST CSF - Protect:    • NIST CSF -  Protect | Cybersecurity I...  
#7 - NIST CSF - Detect:    • NIST CSF - Detect | Cybersecurity Ins...  
#8 - NIST CSF - Respond:    • NIST CSF - Respond | Cybersecurity In...  
#9 - NIST CSF - Recover:    • NIST CSF - Recover | Cybersecurity In...  
#10 - Lost/Stolen Device:    • Lost & Stolen Device | Cybersecurity ...  
#11 - Data Privacy explained:    • Data Privacy Explained | Cybersecurit...  
#12 - Data Privacy laws:    • Data Privacy Laws | Cybersecurity Ins...  
#13 - Data Privacy Tips:    • Data Privacy Tips | Cybersecurity Ins...  
#14 - Top Cybersecurity Threats:    • Top Cybersecurity Threats | Cybersecu...  
#15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware:    • Phishing and Malware: Viruses, Trojan...  

Комментарии

Информация по комментариям в разработке