Almost one-fifth of UK theft leads to data loss

Nearly a fifth of stolen mobile and computing devices contain important data, police numbers show

Data breaches

Almost one-fifth of all theft in Britain results in the loss of sensitive data, according to information gleaned from the UK's police forces.

More than 164,192 pieces of computing and communications equipment were stolen across the UK between March 2013 and February 2014, according to a figures obtained by network security vendor ViaSat.

Advertisement - Article continues below

All 46 police forces in the UK were contacted with a Freedom of Information request by the firm. Of the 41 forces that responded, 35 gave full enough information to provide a precise analysis of the data.

Desktop computers, laptops, tablets, smartphones and USB drives ranked among the most likely items to be stolen in the country last year, with 14 per cent of those thefts being reported by companies.

Chris McIntosh, CEO at ViaSat UK, said: "If less than 1 per cent of the devices stolen in burglaries or personal thefts contained any sensitive information that is still a huge amount in the wrong hands."

Theft from members of the public, whether burglary or mugging, gave much higher results with 28 per cent of all burglaries and 66 per cent of all muggings resulting in the theft of a mobile or computing device.

"It's clear the need to protect personal information must be understood by everyone, from heads of security to housewives and husbands," said McIntosh.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Bob Tarzey, analyst and director at Quocirca, told IT Pro that when devices are stolen at random, the chances of present data being useful to a thief are low. Usually the data that is present is limited to information about the original owner.

"If the device is an unprotected work device then regardless of the usefulness of the data to the thief, there is still the possibility of a compliance issue with certain data types," he added.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020
Visit/security/cyber-security/355368/microsoft-builds-ai-to-detect-security-flaws-with-99-accuracy
cyber security

Microsoft AI can detect security flaws with 99% accuracy

20 Apr 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020
Visit/policy-legislation/data-protection/355835/nhs-yet-to-understand-the-risks-of-holding-test-and-trace
data protection

NHS yet to understand risks of holding Test and Trace data for 20 years

29 May 2020