{"id":4695,"date":"2012-02-14T17:52:05","date_gmt":"2012-02-14T22:52:05","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=4695"},"modified":"2022-08-27T14:21:35","modified_gmt":"2022-08-27T18:21:35","slug":"schools-riskiest-for-computer-theft","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/schools-riskiest-for-computer-theft\/","title":{"rendered":"Schools Riskiest for Computer Theft"},"content":{"rendered":"<p><a href=\"http:\/\/www.fggam.org\/2013\/10\/confessions-of-a-church-thief\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-108592\" title=\"Schools Riskiest for Computer Theft\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thieft_laptop.jpg?resize=76%2C89&#038;ssl=1\" alt=\"Schools Riskiest for Computer Theft\" width=\"76\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thieft_laptop.jpg?resize=128%2C150&amp;ssl=1 128w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thieft_laptop.jpg?resize=64%2C75&amp;ssl=1 64w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thieft_laptop.jpg?w=696&amp;ssl=1 696w\" sizes=\"auto, (max-width: 76px) 100vw, 76px\" \/><\/a><a title=\"Absolute Software Corporation\" href=\"http:\/\/www.absolute.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Absolute<\/strong> Software Corporation<\/a> (<a title=\"ABST\" href=\"https:\/\/www.tradingview.com\/chart\/?symbol=NASDAQ%3AABST\" target=\"_blank\" rel=\"nofollow noopener\">ABST<\/a>), is a\u00a0<a title=\"Vancouver\" href=\"http:\/\/vancouver.ca\/\" rel=\"homepage\">Vancouver, <\/a>Canada-based computer security and <strong>end-point management<\/strong> firm. The company founded in 1993 provides firmware-based, computer theft recovery, data protection, and secure computer life-cycle management systems identified the top 10 target areas for the theft of mobile computers.<\/p>\n<p><a href=\"http:\/\/www.absolute.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108594 size-full\" title=\"Absolute Software logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Absolute_logo.png?resize=104%2C32&#038;ssl=1\" alt=\"Absolute Software logo\" width=\"104\" height=\"32\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Absolute_logo.png?w=104&amp;ssl=1 104w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Absolute_logo.png?resize=75%2C23&amp;ssl=1 75w\" sizes=\"auto, (max-width: 104px) 100vw, 104px\" \/><\/a>The maker of <a title=\"LoJack for Laptops\" href=\"http:\/\/www.absolute.com\/en\/lojackforlaptops\/home.aspx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">LoJack for Laptops<\/a> <a title=\"www.itnewslink.com\" href=\"https:\/\/web.archive.org\/web\/20121017131143\/http:\/\/itnewslink.com\/article.php?id_article=12040\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a title=\"www.itnewslink.com\" href=\"https:\/\/web.archive.org\/web\/20200928204650\/http:\/\/itnewslink.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ITnewsLink<\/em><\/a> that the top 10 list reveals that <a title=\"Consumer\" href=\"http:\/\/en.wikipedia.org\/wiki\/Consumer\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">consumer<\/a> <strong>computers are more likely to be stolen while at school<\/strong> or home. The list is based on theft reports filed to the <a title=\"Absolute Theft Recovery Team\" href=\"https:\/\/homeoffice.absolute.com\/theft-recovery\/\" target=\"_blank\" rel=\"nofollow noopener\">Absolute Theft Recovery Team<\/a> by Absolute customers over a one-year period. With the holidays approaching, Absolute is warning that the risk of computers being stolen from the home is higher than what many consumers perceive.<\/p>\n<p>&#8220;The trends in this list may surprise some computer owners. They often think of security issues only when they are on the move,&#8221; said <a title=\"Mark Grace\" href=\"https:\/\/www.absolute.com\/company\/leadership\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mark Grace<\/a>, vice president of consumer business at Absolute Software. <em>&#8220;However, with schools and residences topping the list of places computers are stolen, owners need to be extra cautious, particularly around the holidays when home burglaries often increase.<\/em>&#8221;<\/p>\n<p>Top 10 Places Consumer Computers Are Stolen<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20231015091504\/https:\/\/blogs.worldbank.org\/edutech\/computer-labs\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108596\" title=\"Typing class\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/typing_class.png?resize=180%2C170&#038;ssl=1\" alt=\"Typing class\" width=\"180\" height=\"170\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/typing_class.png?resize=150%2C142&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/typing_class.png?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/typing_class.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 180px) 100vw, 180px\" \/><\/a>1.<strong> K-12 Schools<\/strong><br \/>\n2. Residential Properties<br \/>\n3. Automobiles<br \/>\n4. Businesses\/Offices<br \/>\n5. <strong>Universities and Colleges<\/strong><br \/>\n6. Hotels and Motels<br \/>\n7. Restaurants and Cafes<br \/>\n8. Stores and Shopping Malls<br \/>\n9. Public Transit (includes taxis, buses, trains, etc)<br \/>\n10. Airports (terminals, security checkpoints, storage areas and airport restaurants<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The Absolute software offers several advantages. When a device is reported stolen a signal is sent that freezes the computer and displays a custom message for whoever finds it. In order to prevent identity theft unauthorized users cannot access the content on the computer, and even delete files, including the operating system. If a computer is stolen, the Absolute Theft Recovery Team will work with local law enforcement to recover it.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.prnewswire.com\/news-releases\/detroit-public-schools-uses-absolute-software-to-help-dismantle-organized-criminal-ring-135569718.html\" target=\"_blank\" rel=\"noopener noreferrer\">Detroit Public Schools Uses Absolute Software to Help Dismantle Organized Criminal Ring<\/a> (prnewswire.com)<\/li>\n<li><a href=\"http:\/\/notebooks.com\/2011\/10\/31\/5-scary-notebook-recovery-stories-guns-drugs-and-identity-theft\/\" target=\"_blank\" rel=\"noopener noreferrer\">5 Scary Notebook Recovery Stories: Guns, Drugs and Identity Theft<\/a> (notebooks.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Absolute Software says that computers are more likely to be stolen at schools home cars Offices University Hotels Restaurants Stores taxis Airports<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,2454,1073,608,713,128,951,4,1071],"class_list":["post-4695","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-absolute-software","tag-abt","tag-identity-theft","tag-information-privacy","tag-k12","tag-pii","tag-security","tag-theft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=4695"}],"version-history":[{"count":11,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4695\/revisions"}],"predecessor-version":[{"id":130852,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4695\/revisions\/130852"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=4695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=4695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=4695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}