LATEST UPDATES

Microphones, smartphones, laptops among items stolen from BBC

Tierney – inventory.adobe.com

A total of 105 devices were stolen from the BBC in the previous two years, some of which can even were though-provoking away by far-off workers

Alex Scroxton

By

Printed: 22 Feb 2021 11: 35

A total of 105 devices, including laptops, mobiles, tablets, cameras and laborious drives, were stolen from BBC workplaces and workers in the previous two years, in response to records purchased below the Freedom of Records Act (FoIA) by Griffin Law.

Over the 2-365 days duration queried, the corporation revealed that particular person microphones had been essentially the most continuously purloined tool, with 36 taken in total – 10 in 2019 and 26 final 365 days. In the same 24 months, the BBC also misplaced 35 smartphones – 19 in 2019 and 16 in 2020.

The records also revealed 11 laptops and MacBook devices had been stolen in 2019, and six in 2020, and additionally two laptops had been reported stolen final 365 days. The BBC also misplaced four laborious drives, a camcorder and an Amazon Fireplace TV Stick.

A BBC spokesperson commented: “The BBC takes incidents of crime severely and we’re consistently imposing and reviewing measures to minimize crime and recover misplaced and stolen items.”

The nature of many of the devices taken – in particular at some stage all the map thru 2020 – could well ticket some stage of insider action on the BBC, in particular with regard to microphones, potentially of use to staffers working from home.

Edward Blake, area vice-president of Absolute Gadget for the UK and Eire, mentioned: “Regarded as one of the most finest challenges going thru organisations in the center of the Covid-19 pandemic has been efficiently securing and managing key devices like laptops from loss, theft and rising cyber dangers.

“You would’t supply protection to what you can well no longer look [and] with so many individuals both working remotely or on the switch, gigantic organisations just like the BBC will inevitably look devices tear lacking, some of which is ready to comprise confidential records,” he mentioned.

Blake mentioned that as organisations equivalent to the BBC proceed to mandate work-from-home insurance policies for non-key workers, they cannot afford to count completely on community-essentially based cyber safety insurance policies, but quite wished to implement extra endpoint safety measures.

“This model guaranteeing they’ve an unbreakable digital tether to all devices in a position to delivering entire visibility and take care of watch over, enabling proper-time insights into the verbalize of these devices and allowing them to self-heal safety controls and productiveness instruments,” he mentioned.

Writing in Computer Weekly earlier in 2021, Elliot Rose and Cate Pye of PA Consulting mentioned that in mild of constant bag cash working from home orders, safety groups wished to construct customers with processes and programs that abet and affords a enhance to compliance with cyber safety insurance policies, which could well encompass tool insurance policies.

“Whereas looking out to be all-controlling erodes the effectiveness beneficial properties we comprise made in the contemporary digital world, some level of take care of watch over remains to be required. This could well also soundless be explained and seen as supporting and defending our other folks from threats,” they mentioned.

Mike Gillespie, managing director and co-founder of autonomous safety consultancy Advent IM, mentioned that by working with customers to aid them realize what safety groups strive to attain, and empowering them, organisations can better abet initiative, discretion and in sort-sense.

“In the extinguish, we close up with a newly trained, empowered, disciplined and highly motivated far-off group of workers who’re working with us to stable our resources,” he wrote. “Longer time duration, this could well truly lead to a decrease label of ownership thru a decreasing dependency on the know-how by myself.”

Advise material Continues Beneath


Be taught extra on Endpoint safety

Back to top button
%d bloggers like this: