ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

IT Security; How Important Is It?

Updated on May 13, 2015

It had been a while since I had touched bases with my old firm and the IT manager that had taken my place some years ago. After several minutes of the usual “catching up” jargon, I hit Jim with the purpose of my phone call. I tried to make it as nonchalant and impersonal a question as I could, but the immediate silence and subsequent sarcastic chuckle denoted the obvious intensity of the inquiry. The question; “Have you been able to get a handle on employee theft of computers, media, and other electronics, and, how has it affected the company year to date?”

I knew from his continued “moment of silence” this had been an ongoing issue from the moment I left the same chair he was now using to respond to my question. To quote his exact words; “It is and has been an immense waste to spend so much time applying security techniques, to spend so much money for security training, and to spend so many man-hours reassuring and explaining, when valuable and supposedly secure data and information is walking out of the backdoor under someone’s arm. The room used to store equipment destined for destruction or “scrubbing” would be better suited as a workout room rather than a staging area. You would think the explicit memos and extensive security postings would be enough for “adults” to understand the impact of what is trying to be accomplished, and, that compromised company data and information not only affects my job but theirs’ as well”.

There was no need to explore his answer in-depth, and his obvious disgust reflected the outlook of hundreds of other IT Managers and Security Mangers across the country. And to think, this was just a small company of fewer than two-hundred fifty employees. What then could we expect from a much larger entity? Of course employees at most any level are not concerned that they may have valuable company data on the pc they found lying in a pile amidst so many others. After all, it’s only one computer that is destined to be destroyed and it certainly it wouldn’t be missed.

Maybe we should blame it on an economy that has made the cost of living increase so sharply that computers and electronics devices are a luxury for many households. Many employees at all economic levels now face economic constraints where they cannot just go buy the latest computer or electronic gadget. Hence, the very foolish decisions to steal, has ultimately led to over $40 billion in losses by small businesses in this country each year.

Needless to say, much larger companies have a much larger problem to resolve. Except for obvious notoriety made through media exposure, most computer crimes are not reported because companies feel that customers, investors, and major management may interpret such events as managerial shortcomings. Rather than by security controls, most clues that reveal most crimes are often by chance, through informants, or errors on the part of the culprit.

Why should this be a big deal you ask? Then allow me to share this example. Just this year in May, a Homeland Security Employee in Tennessee was arrested for stealing and selling two laptops. The laptops had not been “scrubbed” and contained very sensitive Homeland Security data and records. Still feel secure? Fortunately, the individual whom he sold the laptops was an undercover cop already on a stolen goods case. Again, here is a much larger entity that would have had a much larger problem.

As a second case scenario, let’s use the computer technician who worked for the Nutley Board of Education, in Nutley, New Jersey. In June of this year he reportedly stole over ten laptops and two apple desktops, and sold them to local pawnshops in the area. The incident was only discovered when a lady who had purchased one of the laptops saw it had been registered to the Nutley school system and immediately reported it. Though the value of each laptop and desktop was only $1000 each, according to the school system, the information and records yet stored on the computers was far more valuable than its cost.

Not only do we look at the astronomical cost of stolen goods, I’ve also described the next major issue with computer equipment theft. That problem is how profoundly the data and records on stolen computers, if retrieved and placed in the “right” hands, may jeopardize the solvency of a small business. Though there are those who would resolve not to believe, computer theft and data loss continues to increase with serious and costly consequences. Without a more systematic resolution, thefts will continue to rise as long as the black market for cheap computers remains strong, access to computers is easy, and thieves can profit by using or re-selling sensitive or confidential data. While it might not be as easy to search and copy specific files, the theft of the entire computer, hard drive, or some other media type, might ensure a broader range and quantity of data and information.

The issue of data integrity and security seems to be a concept taken by most as a grain of salt. Regardless of the environment, or the security level assessed, even upper level management will not turn down the opportunity to obtain a “free” storage media or electronic device. In a small company such as this one I was a part of, and after conversation with my managerial replacement, it was apparently still hard to hide or disguise security methods such as cameras or motion sensors, and even harder to secure an area designated with more than one purpose and under the jurisdiction of so many others.

In most cases, employees are not trained on how to properly protect proprietary information. Most computers professionals are also too rushed, backlogged, and overwhelmed with their “normal” day to adequately secure proprietary equipment or protected materials. From the user standpoint, most users assume that if a file doesn't show up in a directory or folder, then it must not exist. Few users know how to undelete files or to recover files that have been accidentally deleted. Most computer users, inclusive of experienced users, are unaware that deleted files on these stolen devices can be recovered or undeleted. Deleted files are not erased but rather just hidden, and the data can be easily undeleted and restored.

Though it is unlikely your mother or little brother can undelete your files or seek to "trawl" for interesting data, there are those that could find anything they wanted on your old computer with a few simple tasks. Obviously, this information was deleted for a purpose and often contains highly sensitive business or government records and transactions as well as sensitive emails. As much as we’d like to think so, not everyone has good intentions when a computer is stolen from a pile of “throwaways”. There is certainly no “goodwill” defense for the laptop stolen from the back seat of a locked vehicle. Believe it or not, theft or loss of a computer or data storage medium makes up 54 percent of all identity theft-related data breaches.

Even so, most computer crimes are not committed by hackers, by someone who finds a laptop in a car, or by employees simply seeking a toy they could not otherwise afford. In reality, most equipment and data thefts are committed by trusted employees who turn against their employers for various reasons. There are increased incidents of employees taking proprietary information via equipment theft when they believe they will be, or are, searching for a new job. Some employees steal information via equipment due to what they feel is a lack of respect, incongruity with fellow cohorts or boss, or just career dissatisfaction.

Unfortunately, in this day and time, I would not be honest if I did not include “Divided Loyalty” or allegiance to a different entity or person, or to a different country, as a reason for data and equipment theft. Though it is a reason we’d like to least consider, it is yet a viable concern of both large and small business entities.

As exciting as the technology and capabilities have become over the last couple of decades, computers and the issues that follow it must be addressed as any other issue in our society. Whether environmental or an integral part of daily business, the issue here stretches beyond the scope of idealism, or a moral concept of integrity. It entails educating, planning, implementing, monitoring, and making a difference we can really see.


    0 of 8192 characters used
    Post Comment
    • The-Quietwarrior profile imageAUTHOR


      4 years ago

      Thanks Frank. i appreciate that.

    • Frank Atanacio profile image

      Frank Atanacio 

      4 years ago from Shelton

      Quiet this is a very good hub..useful and easy to follow.. a hub of the day hub if you ask me :) voted up and shared


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)