A recent study prepared by the Poneman Institute claims over 10,000 laptops are lost or stolen every week at airports in the United States. If this number is to be believed, the threat to corporate security from the loss of these laptops is certainly extreme. Various tips have been offered by several authorities to reduce this threat: clear marking of the laptop as “property of _____,” always making sure the laptop goes through the security conveyor belt before the traveler steps through the metal locator, promptly reporting thefts, use of encryption and biometric authentication, remote destruction capabilities, phone-home features, etc. The purpose of this entry is not review the report or the tips offered by others, but to highlight the threat in the context of the time of year – the vacation season. More and more employees are taking their laptops to far-flung vacation destinations to “check-in” with the office. While certainly commendable, this presents two additional risks to corporate information. First, the laptops are being carried, not in connection with business activities, but as part of vacation plans where the employee’s vigilance may be less than acute. Second, the vacation destinations themselves may present a greater likelihood of theft or loss of control over the laptop. It is one thing to control a business laptop in a room at the London Hilton, it is quite another to secure the laptop while on a biking vacation in Tuscany or while trekking in Thailand.As never before, employees must be trained and re-trained on the necessity of controlling their laptops at all times and ensuring their security. In my experience, the overwhelming majority of laptop losses and thefts result from employee negligence, which can generally be directly linked to a failure to adequately train. While summer is already under way, it is not too late to remind employees about their obligations when travelling with their business laptops. Failing to do so may make your business one of next week’s 10,000. Related content opinion Finding Common Threads in Privacy and Information Security Laws. By Michael Overly Apr 26, 2013 3 mins Compliance opinion Ensure Your Data is Securely Deleted By Michael Overly Mar 11, 2013 2 mins Cloud Security opinion CIA in the Cloud By Michael Overly Dec 18, 2012 2 mins Cloud Security opinion Overreacting to Information Security By Michael Overly Dec 10, 2012 2 mins Privacy Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe