Two laptops are lost on the tube every day, says TfL

Number of lost devices has shot up by almost 80 per cent since 2010

Two laptops are lost or misplaced every day on the London Underground, according to new figures from Transport for London (TfL).

More than 3,500 laptops have been reported lost in the last five years, according to data obtained by memory and storage company Crucial, representing an increase of almost 80 per cent since 2010.

In addition to this, more than 800 laptops have been reported missing at major Network Rail stations, including Kings Cross, Birmingham New Street and Glasgow.

Losing work devices poses a serious security risk to enterprises, Crucial warned, because they can contain sensitive or business-critical information that can easily be exploited by cybercriminals.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"The data from Transport for London and Network Rail is only giving us a glimpse of the data security issue in the UK," said Jonathan Weech, Crucial's senior product manager for SSDs.

"Consider also the number of laptops that have been hacked and it really starts to demonstrate how vulnerable our data really is, and how easily it can get into the wrong hands."

Weech highlighted the importance of taking as many steps as possible to protect your information, saying "self-encrypting hardware can keep your confidential data out of the reach of hackers and data thieves".

"Comparing software-based encryption and hardware-based encryption is like comparing a padlock to a vault," he explained. "When it comes to data security hardware-based encryption is a much stronger option for protecting data than software-based encryption, or worst of all, no encryption."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/29068/is-your-company-taking-enough-accountability-on-cybersecurity
Security

Are you taking enough accountability on cyber security?

18 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/security/data-breaches/354611/misconfigured-security-command-exposes-250-million-microsoft-customer
data breaches

Misconfigured security command exposes 250 million Microsoft customer records

23 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/hardware/354584/windows-10-and-the-tools-for-agile-working
Sponsored

Windows 10 and the tools for agile working

20 Jan 2020