Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Mitigating Laptop Theft

November 11, 2003
Laptop computers are notorious for being prime targets for theft in office buildings because they are small, concealable, and are usually not “flagged” by security personnel when an employee or visitor exits the facility. In the United States alone in the last three years, over one million laptops have been stolen. Many personal computer (PC) leasing companies report an average 20 percent loss of laptop computers at the end of a two-year leasing period (10 percent annual loss). Statistical research has shown that the major causes of laptop computer losses in a typical organization are due to:

• Internal loss/theft - 90 percent

• External theft - 10 percent

Some of the major reasons for this internal loss/theft may be due to: a loss of records or inaccurate records as a laptop is transferred from one employee to another, an internal theft ring, an employee who refuses to return a company computer after being terminated, an employee who has given misleading information regarding the location of a computer, a lone thief or a disgruntled employee. Typical perpetrators of external theft include messengers, technicians who are in the facility to repair a piece of equipment, a smash-and-grab thief or an unscrupulous visitor.

Over the years there have been a variety of technologies developed to help mitigate the theft of these laptop computers. However, most of the devices that have been marketed have been primarily mechanical in nature, with a low level of technical sophistication. More recently, some very innovative and inexpensive products have become available in the marketplace, which provide a higher level of protection for PCs. Some of these products are software-based while some of them are hardware-based. What follows is a brief overview of these products.

Tracking

Computer tracking programs are software-based products in several variations. Some of these programs send a stealth email message to a pre-determined email address as soon as the PC is connected to the Internet. This email message will contain the exact location of the stolen PC, along with a wealth of additional information. This information includes the route Internet Protocol (IP) addresses, the name of the person who has logged on, dial-up networking Internet service providers, user IDs, etc. When this message is received via the Internet, the software manufacturer’s in-house recovery agents work with the client and law enforcement authorities to attempt to recover the stolen property. The software can also be set to run on a periodic basis to allow a continual reporting the location of the PC. Other manufacturer’s software programs use a combination of Internet and telephone call tracing to locate the missing computer. Here, the stealthy software waits for a telephone line to be connected to the modem. Upon connection, it dials the manufacturer’s central monitoring theft recovery center to identify its current location. Additional software features of these programs include the capability to remotely and systematically delete all data and user files on the hard disc drive when the targeted computer surreptitiously contacts the theft recovery center. This helps to mitigate a corporation’s legal liability by preventing confidential client information or other sensitive computer data from falling into the wrong hands. Typically, these software programs use less than two percent of a computer’s operating system resources, and then only until they have emailed out their message packets. Most of these software packages are very inexpensive, user-friendly and are available retail for between $30 and $40 each.

The key to success in locating and recovering any missing PC is the ability of the software to track in real time and have an established set of processes, procedures and protocols for working in a collaborative effort with law enforcement authorities. Although these new and innovative software packages have been shown to provide some reduction in incidents of laptop theft in facilities where they have been installed, they may be regarded as only reactive crime measures, since they do not directly inhibit external theft. However, these software products do provide a powerful tool for investigators who are attempting recovery after a theft has already occurred.

Going Wireless

Wireless transmitters and receivers also are used to curtail the theft of laptop computers. These units are two-piece RF-based systems. A small battery-operated transmitter is mounted on the computer chassis, while the receiver is mounted in a convenient location in a room that is within the operating range of the transmitter. When the signal is lost between the transmitter and the receiver during an attempted theft, the receiver will initiate a loud audible alarm that can be heard throughout the office. This type of device is very secure, as random synchronized codes are communicated between the transmitter/receiver pairs to deter a possible compromise of the system. The use of these units may be regarded as proactive crime measures, since they directly inhibit theft and summon help once the computer has left the operational range of the receiver. These transmitter/receiver units are typically available retail for approximately $70.00 for the pair.

This technology also includes active radio frequency identification tags.

Cables and Locks

Cabling systems are devices that generally consist of a high tensile strength cable, a high-security lock and a metal baseplate with high-security screws or high-strength adhesive materials. These devices are simple to install and deter against theft by physically securing the computer to a desk or table. These devices are highly secure and are regarded as proactive security measures. However, they do severely limit any physical movement of the computers from their semi-permanent mounting locations. The cost of these devices varies, but typical costs are generally in the $30 to $90 price range, depending upon features.

Locker storage systems are a less common methodology used to protect laptop computers from theft. Here, an access-controlled locker secures the laptop computer at the end of each workday, while providing an audit trail of all transactions, including any attempts at unauthorized entry. While this methodology works well to prevent thefts during non-working hours, it does little to mitigate incidents of theft during normal working hours of the day.

Video surveillance systems provide a very good means to track and record all activity within an office complex. If the security command and control center is manned, security personnel can immediately respond to any aberrant or criminal activity that has occurred. Even if the system is unmanned as in many facilities, it can still act as an effective deterrent to theft as well as become a powerful investigative tool after an incident has already occurred.

Proactive security measures are one of the most overlooked methods used to mitigate theft. A simple set of corporate security policies and procedures can be implemented as a protective measure. These may include: having all visitors escorted by a responsible employee any time they are within company office space, performing more comprehensive background investigations on prospective employees, keeping better records regarding the assigning of laptop computers to individual employees, instituting a policy of having all packages searched upon leaving the corporate facility and having security personnel maintain a log cataloging the model and serial number of every laptop computer exiting the facility along with the corresponding name of the employee or visitor. While the latter is likely to be considered a bit Draconian and may be met with some stiff employee resistance, it most assuredly will result in a measurable decrease in company laptop computer losses.

These innovative products and proactive measures should be regarded as important aspects to any comprehensive security system. Corporate security directors and facility managers should consider all or some of these when developing their overall corporate security protection plan.

SIDEBAR: Software Benefits

• Ability to work behind firewalls

• Compatibility with all email systems

• Compatibility with dial-up networking

• Compatibility with all anti-virus programs

• Secure 128-bit encryption of the message text

prevents plain text from being transmitted

through cyberspace

__

Some very innovative and

inexpensive products provide a higher level of protection for PCs.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Just Released, Administration Strategy on Mitigating Theft of U.S. Trade Secrets

    See More
  • 5 Minutes Santor

    Mitigating fraud, theft and scam risks within financial institutions

    See More
  • UVA Protects Students from Laptop Theft

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • effective.jpg

    Effective Physical Security, 5th Edition

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing