The BBC has noted the theft of 105 electrical products from its premises in excess of the very last two a long time, in accordance to information attained pursuing a Freedom of Facts (FoI) ask for by litigation agency Griffin Legislation. The results have lifted fears that confidential information and facts contained in these products will have fallen into the fingers of destructive actors.
A whole of 35 mobile phones had been stolen above the two yrs from the premises of the UK’s community services broadcaster: 19 throughout 2019 and 16 in 2020. On top of that, 17 laptops and MacBooks were taken over this time, 11 in 2019 and six in 2020, and two tablet pcs had been stolen very last year.
Other electrical devices reported as stolen in the two-12 months time period were being 36 personal microphones, four tricky drives, one particular camcorder and one firestick.
In response, the BBC reported in a statement: “The BBC normally takes incidents of crime critically and we are consistently applying and reviewing steps to lessen crime and get better shed and stolen objects.”
Industry experts imagine that the issues in stopping theft of this sort of equipment within large cell workforces highlight the importance of possessing stringent cybersecurity controls in electrical gadgets to maintain sensitive data secure.
Edward Blake, location vice-president, Complete Application Uk&I, commented: “One of the major issues facing businesses all through the COVID-19 pandemic has been productively securing and handling key devices like laptops from loss, theft and mounting cyber-challenges. You simply cannot defend what you are unable to see. With so numerous people today either doing the job remotely or on the transfer, big organizations like the BBC will inevitably see equipment go lacking, some of which will comprise confidential knowledge.
“With numerous firms now necessitating their staff to function from dwelling, corporations can no more time be entirely reliant on network-dependent security they have to have to maximize their aim on securing the true endpoint devices. This implies guaranteeing they have an unbreakable electronic tether to all equipment, able of delivering complete visibility and manage, enabling true-time insights into the point out of individuals products, and permitting them to self-heal security controls and efficiency tools.”
Some parts of this article are sourced from:
www.infosecurity-magazine.com