By J. Michael Coleman
Published in the May 2007 issue of Today’s Facility Manager
Today’s office environment features busy and mobile professionals who are continually on the go. Conference calls take place on cell phones, the Internet is surfed on PDAs, and important data is transported back and forth on notebook computers, portable hard drives, and USB flash drives the size of a key. However, this convenience and portability has a very high price for many companies.
Transportable electronic devices are easy prey for thieves who can resell the products on the street for a huge profit. Laptop thefts alone accounted for nearly $6.7 billion in losses during 2004—or an average of almost $50,000 per company. Laptops sell on average for less than $1,000 each on the black market, but the information on the hard drive is generally far more valuable than the hardware.
Many people who wouldn’t dream of leaving their computer or phone sitting in their unlocked car think nothing of leaving those items in an unattended cubicle at work. Technological advances have bred a new generation of criminals called “office creepers.” These individuals are dressed like employees or building service personnel and rely on the anonymity of busy office buildings to shield them during their crime.
The following top 10 tips may help facility professionals to keep the “office creeper” at bay and protect the working environment.
1. Office Creeper 101. An office creeper may skulk into your office dressed in uniform like a building engineer or in upscale casual wear or suit and tie to blend into the corporate culture. Try to become familiar with all of the coworkers in your immediate area. By knowing the identities of all your coworkers, you can easily identify an individual who may be out of place.
2. Flag And Tag The Wanderer. If you see someone unfamiliar wandering the halls or casually roaming about, ask if you can help them. Ask questions like, “May I help you find someone?”
3. Honor Your Access Control Policy. If your building has an access control policy where visitors must wear badges, you should notify security immediately if someone is walking around without proper identification. If you believe an individual seems suspicious, notify security. Be sure to note details about the person’s appearance so you can provide a thorough description.
4. Sharing Isn’t Always Caring. Sharing can be great if you want to divvy up the contents of an office gift basket, but it’s not appropriate when your personal security is at risk. Never share keys or access codes with anyone and never leave your office keys unattended. Keep your personal keys and office keys on separate rings.
5. Don’t Hide Valuables In Plain Sight. While it may feel safer to tuck your wallet or purse into an unlocked cabinet drawer or under your desk, it’s not really all that safe; this is generally the very first place an office creeper looks. Position coat racks and hangers away from all doorways so a thief cannot easily snatch items from the outside.
6. Lock And Mute. When leaving your office, make sure to lock the door and mute the telephone ringer. An unanswered phone is a clue to a thief that your office is empty.
7. Secure The Ties That Bind. Talk to management about purchasing security cables for laptops. This is an inexpensive locking device that secures a computer to the desk so that it cannot be easily removed.
8. Maintain Up To Date Inventory Logs. Maintain an accurate inventory of all office equipment, furniture, and devices in a locked, fireproof cabinet or other outside location (like your home office). Clearly mark all personal electronics such as PDAs and cell phones with identification. You can use non-removable tags or an inexpensive engraving pen that have been designed for just this purpose.
9. Laptop Awareness. To avoid having your notebook be one of the 3,000 computers stolen each day, be sure to lock this essential business tool in your office during off hours. Whenever possible, take your laptop home with you so you always know where it is. Keep only the most necessary proprietary information on your portable machine while updating your network with all sensitive information. Never load passwords onto your laptop, and don’t leave your computer unattended in a public place, even for a moment. Back up all your files and store that information some place other than your laptop carrying case.
10. Invest In Laptop Data Security Tools. Several effective laptop and data security options are available to protect your equipment from theft. IBM’s new secure notebooks are equipped with Asset ID, a radio frequency based security and asset-tracking technology. Automatic online backups by Toshiba prevent anyone from reading the data your computer sends without your pass phrase, since information is encrypted before your PC transmits it. Numara Track-It® is a product that blasts a sonic alarm if you get more than 40′ from your laptop to alert you that it has been left behind. CompuTrace is a software program that calls in with the laptop’s location to a Central Monitoring System. These calls are made at regular intervals, providing the electronic serial number, phone number (from which it is calling), and other trackable information.
Finally, when traveling from your office, carry your notebook in a strong, padded nondescript bag. Don’t use a carrying case that advertises there is a computer inside. Never leave your laptop in full view in your car, and don’t check your computer as luggage at the airport. Most office thefts can be prevented, and by following practical steps you can avoid becoming another police statistic.
You might like:
- Workplace Design: Four Trends
- Predictive Analytics For “Low-Tech” Facilities
- Employee Engagement: Impact Of Workplace Design
- Friday Funny: The Dirty Truth About Public Bathrooms
- Leadership Support Linked To Workplace Well-Being
- Planned Investment In Energy Efficiency Hits All-time High
- Five Safety Tips For Your Facility’s Construction Project
- Facility Management Critical To Infection Control
- Employee Engagement Linked To Workplace Satisfaction
- 4 Ways To Avoid LED Lighting Failure
- New School Construction Focused On Building Envelope Performance
- Healthcare Waiting Room Design
- Employees Are Leading Cause Of Data Breaches
- U.S. Employers Suffer Largest Talent Shortage In Skilled Trades
- Smart City 2.0: Next Step In Urban Innovation
Topic Tags: Allied Barton Security Services