Don’t Lose Your Organization's IT Assets
March 16, 2022 •HoganTaylor
Keeping track of every IT asset — particularly as remote work has become common — is essential if your company wants to limit financial losses and fraud risk. According to some estimates, most remote employees use at least two employer-assigned devices, and a smaller percentage use three or more. In general, the more devices in use, the greater the potential for loss or theft.
But you can keep tabs on hardware such as desktops, laptops, mobile phones, tablets and the software you’ve purchased or developed to operate them, with IT asset tracking. Following is a three-step guide.
- List your assets. The first step involves developing a list of the IT assets you need to track. Although third-party software can help simplify this task (especially if the software incorporates physical barcoding to identify and track physical assets), cost may outweigh the benefits for small businesses. In those cases, a simple spreadsheet can suffice. Regardless of the approach you follow, the goal is to identify every asset and ensure the tracking database or document is kept up to date.
- Develop policies and procedures. Your company must have tracking mechanisms at every stage of the process — from ordering, receiving and assigning to retiring IT assets. When writing your policies, ask such questions as:
- Who’s authorized to purchase hardware or software?
- Is there a process to assign a unique tracking number to each asset?
- How should employees report possible theft or loss?
- What’s the procedure for reclaiming IT assets from employees leaving the company?
- Who’s allowed to access and update tracking records?
- Ensure compliance. To help ensure your IT asset tracking process works as designed, audit it periodically. The audit should focus on the accuracy of the tracking database. It should also document and verify that devices assigned to employees remain in their possession. Depending on the volume of hardware and software your company tracks, it may make sense to randomly select assets for scrutiny. If you find that assets are missing, investigate the incidents thoroughly.
These steps are important because lost or stolen IT assets are expensive to replace. Also, they can expose your company’s data, including customer information, to unauthorized third parties. In extreme circumstances, a missing device may enable a thief to gain access to your company’s IT network. Contact us for more information about preventing fraud and theft.
HoganTaylor's Technology Services
What are you doing to protect your organization from dangerous ransomware gangs? HoganTaylor has a team of experts who specialize in assessing and implementing ransomware protection, safeguarding your business from unwanted and vicious attacks. If you would like an assessment of the maturity level of your organization against these baselines, please contact us.
HoganTaylor's Technology Services include, outsourced CIO and technology solutions, cybersecurity services, and IT strategy and assessments. If your organization needs assistance in evaluating its technology strategies and goals, please contact us to have a conversation with our experienced advisors.
INFORMATIONAL PURPOSE ONLY. This content is for informational purposes only. This content does not constitute professional advice and should not be relied upon by you or any third party, including to operate or promote your business, secure financing or capital in any form, obtain any regulatory or governmental approvals, or otherwise be used in connection with procuring services or other benefits from any entity. Before making any decision or taking any action, you should consult with professional advisors.
Get Updates
Featured Articles
Categories
- Advisory Publications (5)
- Business Valuation (9)
- Employee Benefit Plans Publications (28)
- Energy Publications (8)
- Estate Planning Publications (39)
- Forensic, Valuation & Litigation Publications (22)
- HoganTaylor Insights (8)
- HoganTaylor Talent (52)
- Lease Accounting Publications (15)
- Litigation Support (1)
- Nonprofit Publications (76)
- Tax Publications (95)
- Technology Publications (10)
- Wealth Management (2)
10 Cybersecurity Questions to Consider
Protecting and preserving the things that have made your organization successful starts with understanding what makes it vulnerable.