{"id":1275,"date":"2010-12-03T00:00:00","date_gmt":"2010-12-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/12\/03\/lost-laptops-cost-companies-billions-study-says\/"},"modified":"2021-12-30T11:39:05","modified_gmt":"2021-12-30T11:39:05","slug":"lost-laptops-cost-companies-billions-study-says","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/12\/03\/lost-laptops-cost-companies-billions-study-says\/","title":{"rendered":"Lost Laptops Cost Companies Billions, Study Says"},"content":{"rendered":"<p>A new survey shows U.S. businesses and other organizations are losing billions of dollars due to lost and stolen laptop computers.  But two-thirds of the organizations surveyed do not take advantage of even basic security practices, such as encryption, backup, and anti-theft technologies, the study says.  &#8220;The Billion Dollar Lost-Laptop Study,&#8221; conducted by Intel and the Ponemon Institute, analyzed the scope and circumstances of missing laptop PCs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The survey found the 329 organizations polled had collectively lost more than 86,000 laptops.  Using that figure, Intel and Ponemon calculate that the 86,000 lost laptops cost the 329 enterprises approximately $2.1 billion.<\/p>\n<p>&#8220;Laptops are the greatest risk that I find in my security assessments,&#8221; says Kevin Beaver, an independent consultant and expert witness for Principal Logic.<\/p>\n<p>http:\/\/www.darkreading.com\/smb-security\/167901073\/security\/client-security\/228500279\/lost-laptops-cost-companies-billions-study-says.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,13],"tags":[],"class_list":["post-1275","post","type-post","status-publish","format-standard","hentry","category-news","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1275"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1275\/revisions"}],"predecessor-version":[{"id":3762,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1275\/revisions\/3762"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}