Don’t Lose Your Organization's IT Assets

March 16, 2022 HoganTaylor

IT Assets

Keeping track of every IT asset — particularly as remote work has become common — is essential if your company wants to limit financial losses and fraud risk. According to some estimates, most remote employees use at least two employer-assigned devices, and a smaller percentage use three or more. In general, the more devices in use, the greater the potential for loss or theft.

But you can keep tabs on hardware such as desktops, laptops, mobile phones, tablets and the software you’ve purchased or developed to operate them, with IT asset tracking. Following is a three-step guide.

  1. List your assets. The first step involves developing a list of the IT assets you need to track. Although third-party software can help simplify this task (especially if the software incorporates physical barcoding to identify and track physical assets), cost may outweigh the benefits for small businesses. In those cases, a simple spreadsheet can suffice. Regardless of the approach you follow, the goal is to identify every asset and ensure the tracking database or document is kept up to date.
  2. Develop policies and procedures. Your company must have tracking mechanisms at every stage of the process — from ordering, receiving and assigning to retiring IT assets. When writing your policies, ask such questions as:
  • Who’s authorized to purchase hardware or software?
  • Is there a process to assign a unique tracking number to each asset?
  • How should employees report possible theft or loss?
  • What’s the procedure for reclaiming IT assets from employees leaving the company?
  • Who’s allowed to access and update tracking records? 
  1. Ensure compliance. To help ensure your IT asset tracking process works as designed, audit it periodically. The audit should focus on the accuracy of the tracking database. It should also document and verify that devices assigned to employees remain in their possession. Depending on the volume of hardware and software your company tracks, it may make sense to randomly select assets for scrutiny. If you find that assets are missing, investigate the incidents thoroughly.

These steps are important because lost or stolen IT assets are expensive to replace. Also, they can expose your company’s data, including customer information, to unauthorized third parties. In extreme circumstances, a missing device may enable a thief to gain access to your company’s IT network. Contact us for more information about preventing fraud and theft.

HoganTaylor Technology Services

HoganTaylor Technology Services encompasses all of the Firm’s information technology service offerings including managed services, outsourced CIO and technology solutions, cybersecurity services, and IT strategy and assessments.  If your organization needs assistance in evaluating its technology strategies and goals, please reach out to Cody Griffin, Lead Technology Partner.

 Subscribe to Technology Publications Learn More About Technology

INFORMATIONAL PURPOSE ONLY. This content is for informational purposes only. This content does not constitute professional advice and should not be relied upon by you or any third party, including to operate or promote your business, secure financing or capital in any form, obtain any regulatory or governmental approvals, or otherwise be used in connection with procuring services or other benefits from any entity. Before making any decision or taking any action, you should consult with professional advisors.

Share This:

10 Cybersecurity Questions to Consider

Protecting and preserving the things that have made your organization successful starts with understanding what makes it vulnerable.