Does Your Business Have Unused Laptops Lying Around? You Could Be Violating Data Law

A new report has revealed that 47% of all small firms have up to 50 devices containing sensitive information that are not stored securely

Does Your Business Have Unused Laptops Lying Around? You Could Be Violating Data Law

UK small businesses that store unused devices such as mobile phones, tablets and laptops could unknowingly be violating corporate governance and data protection laws – according to a report by CORETX.

The survey of 100 IT managers revealed that 47% of all small firms have up to 50 devices containing sensitive information that is not stored securely – with 23% admitting they are unable to accurately predict how many neglected pieces of tech they currently possess.

While this might not seem too much of a problem on first glance, when analysing the type of information being stored – it suggests businesses aren’t doing enough to protect important information while also misusing company equipment.

83% of those surveyed have found concerning, personal data on devices, followed by personal emails (68%) sensitive personal information (40%), adult content (37%), gambling (25%) and profanity (24%) – with a further fifth claiming to have uncovered evidence of an employee’s other business interests.

Peter Low, director of field and lifecycle services at CORETX, said:

“The average employee now uses three IT devices each day. It’s becoming ever more difficult for organisations to keep track of business devices, let along manage them efficiently. CORETX research shows that many are struggling to manage a multitude of potentially very serious issues related to the devices deployed within their businesses.

“Keeping devices working and secure through their lifecycle is difficult. Nevertheless, it’s concerning that many companies can’t keep on top of the basics. Our survey found 21% of employers couldn’t say for sure where their devices are and which employees are using them.

“Not surprisingly, they’re unable to retrieve them from leavers in order to redeploy them to new employees to gain the full value from their investment. Or indeed ensure they’re wiped of company sensitive information.”

General Data Protection Regulation: How to Prepare

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>