First: Define your
risks. What equipment would be expensive or inconvenient if lost or
stolen? What pieces are “mission-critical”? What pieces are exposed in
a public access area? What contains confidential or sensitive
information? What would be hard for you to replace, either because of
funding or special configurations?
Second: Come up with a
plan that matches your organization’s environment and budget. Some of our
clients require that every piece of new equipment they purchase be secured when
it is first installed. Some order security devices when they order their
equipment. Others arrange installation of security cables or pads when the
equipment is in place.
Some corporate and
institutional managers hold users and departments responsible for any losses (or
their insurance deductible) if a physical security device is not used. One even
provides a set of security instructions for protecting notebook computers along
with every airline ticket issued by the corporate travel office.
The most effective
strategies provide a comprehensive plan, incorporating (a) asset identification
and inventory, (b) personal or departmental responsibility for assets, (c) a
physical security device to protect the asset when it is in the office or on the
road, and (d) data protection, access control and recovery software.
strategies: Virtually every
type of office
review of the
are a few ideas.
AV Projection & Lab Equipment: Protecting
AV and lab
Security Furniture: Workstations that protect PCs and flat panel monitors while providing a good instructional environment
Asset tagging: Theft deterrent asset tags can
help you get it
Recovery systems: A kind of LoJak™
for laptop and