5 Steps to Prevent Mobile Device Theft and Loss - Tech Learning

5 Steps to Prevent Mobile Device Theft and Loss

1. Set Guidelines: Update security policies to set expectations for use in and out of the classroom.
Author:
Publish date:

1. Set Guidelines: Update security policies to set expectations for use in and out of the classroom. Equipment should be locked at all times in areas open to the public and at home, even when in use.

Image placeholder title

2. Provide Information: Communicate the threats and consequences of laptop theft. For example, 58 percent of laptops are stolen from the office and 85 percent of managers suspect internal theft.

3. Demonstrate Proper Lock Usage: Choosing an easy to use and quick locking system is critical.

4. Have a Backup Plan: Physically securing a device is just the first line of defense against data theft. Creating a comprehensive security plan is the most effective way to protect your school. For example, recommend never leaving a laptop logged onto networks, email, or Web sites, and always shutting down or activating a password protected screen saver.

5. Reward Compliance: Canvas schools for proper use, rewarding secure workstations and confiscating unlocked computers.

Source: Kensington,”IDC Executive Brief: Laptop theft—The internal and external threats” and FBI Computer Survey, Abagnale, F., Matt, B., & Glen, A., et al. (2005).

Featured

Related

Image placeholder title

The Mobile Device Divide

Despite mounting evidence thatmobile devices are linked toacademic success, many districtsstill struggle with the economy of1:1 and BYOD initiatives.

Image placeholder title

Mobile Device Survey

In a recent “Mobile Device Management: Sanity and Success with an iPad 1:1” Tech & Learning/ Lightspeed webinar, participants were asked “Are you planning a mobile device roll-out?” Here are their replies:

Intrusion prevention in primary education

By David R. Bailey As an information systems consultant who has been working with educational technology and security for nearly two decades, I have seen a lot of security breaches. I have seen students change their own or other students’

Identity Theft

Question: What recommendations should districts give employees regarding identity theft, and what steps should be taken if an employee suspects his/her identity has been stolen? The IT Guy says: "ID Theft,", a Website produced by the US Federal Trade Commission’s, is an excellent resource to share

SECURITY: Step by Step

It's time to begin planning for summer upgrades, and if information security isn't at the top of your list, it should be. Your students continue to learn more about the tools and technology that could be used to circumvent your current security infrastructure. What you need is a security architecture and approach that