WE'VE GOT YOU COVERED!

School computer theft: Jedi tricks for data recovery & device tracking

by Matias Wolff 7, Dec, 2016

Device management in schools is no longer just about PC tracking after a computer theft. Schools who are looking for the best recovery software must also consider issues like device and laptop data recovery, and use their information to help the police. 

Device protection of educational IT assets such as laptops, tablets, and mobile devices have evolved enormously in the past years. Their use has changed so much, that instead of blocking their utilization in classrooms, teachers are encouraging its use as a learning tool with the use of Bring Your Own Device program (BYOD) or mobile technologies given by the State and borrowed by the student.  

Gone are the days of textbooks and pencils. Instead, with the support of federal subsidies like 1:1 programs, today most students are learning from tablets and laptops.”

Edtech Digest

But we’re no longer necessarily hooked up to an Ethernet cable and a desktop computer. School children are not just prone to losing their stuff, but are a potential threat for pickpockets or theft.  Now, imagine these devices are commonly spread around outside the classroom into every student’s home.

That’s a lot of balls in the air! Even if we would love to, we can’t simply use the Force for tracking devices! It just doesn’t work that way.

attack-clones91.gif

"Careful, young padawan," device tracking for K-12  

Anti theft security in the school system needs very unique enterprise mobility solutions. According to Edtech Digest, “managing and securing these devices — and safeguarding the students that use them — has become the chief concern for Education IT. Many children aren’t used to carrying around expensive technology and often leave it unattended on their desks or in the playground making it an easy target for theft. So it’s no surprise that public schools are the top location for device thefts in the U.S.”

Of course, the market has a series of choices for theft protection software to track a computer or a tablet. But there is a catch! The personal information of children is delicate, and can ask for trouble.

Well, some options take that into consideration, and “if sensitive or personal student data is on the device, it can be retrieved or wiped clean to protect it from unauthorized access,” Edtech Digest points out.

Phew!

What is school IT looking for?

Securly surveyed IT administrators employed by K12 school or districts or managing a school 1:1 device program:

  • 44% of respondents reported that students in their school at least sometimes lose or misplace devices.
  • 79% if answered that an “anti-theft” solution would be at least "fairly desirable."
  • The majority of admins care most about being able to track the location of the device.

 They also pointed out many of their concerns:

We need a system that will track a device in school or out. Looking for a device once it is lost or stolen is not good. We basically need to know where it was last either before the battery ran out or the device was factory reset by a thief”.

Location tracking would be a huge advantage when students are prone to walking off without their Chromebooks.”

What happens after we locate the device? 

Just imagine that a middle school student, prone to get bullied by an older kid, gets robbed or mugged by a grown up. Adults can cope with the stress and protect their lives rather than the device. But kids can face a lot of pressure. Particularly, if they borrowed the equipment from their professors.

UIUTjU7R8rr7q1.gif

 So, before lending a 1:1 program device to your children, remind them to take care of them, but give them peace of mind

Chill out” We’ve got you covered! That is what a laptop tracker and recovery software is all about!”

 good-job-sarcastic1.gif

Security experts make their call: 

If a student is approached by a thief, they should willingly give up the devices with no resistance. There have been far too many news stories about innocent children being hurt or killed for their mobile device."

Edtech digest 

Not only should you install what experts call “endpoint management and security solutions” on desktops, laptops or smartphones to secure devices, but promote a discussion with students and staff about theft prevention both in school and at home.

In the event a device is stolen, the service kicks in immediately, an investigation begins, and proven investigative techniques are used to assist police in the recovery of the device.”

Edtech digest 

“I just want to find my PC.”

We want to find it too!

But according to computer security experts or police investigators, In the event a protected device is stolen, an investigation is more likely to succeed if this type of technology supports access to the device.

 If you track a stolen computer and access it remotely after they stole it, you're becoming a police sidekick: you can support their investigation, which can "ultimately lead to the identification and potential arrest of the criminals."

help-me-help-you1.gifTom Sims from the San Jose, CA, police department told Securly that the likelihood that they recover a stolen device “is dependent on the amount of evidence. If the thief didn’t trigger an alarm or leave things behind, it’s unlikely”.

“We find that most thieves don’t use the device themselves. It’s more likely instead that they pawn it off to a friend. We often hear something like “Bob sold it to me for $50”. Thus, we’re not overly concerned with who, it’s more about where.”

Then, when your police-IT investigative team finally finds the culprit and ends up tracking a lost laptop, this long crusade would have proven you worthy.

rey-finds-luke-skywalker1.gif

 How do you track school devices? Are you able to give any information to the police?

Protect data and devices on campus

Matias Wolff
Matias Wolff

CMO at Prey. BA in Advertising with a major in Marketing from Universidad del Pacífico. Master in International Marketing at ESMA, Barcelona. 18 years’ experience in multinational companies. I am a volunteer at the Endeavor program, and teach Integrated Marketing Communications at the Masters in Innovation program, Universidad Católica de Chile.
Let's connect:   

check out our

Related Blog Posts

Asset management & advanced search: wizard's guide to label location

by Matias Wolff February 17, 2017

You’ve realized that an advanced search capacity is a must have tool to track your devices in multiple locations...

Read More

4 Challenges CIOs and IT Professionals will face in 2017

by Matias Wolff February 16, 2017

Hello 2017! Adiós 2016, a year that many wanted to leave behind. But now, a new period is starting, that will bring many..

Read More

The Current State of Handling Device Security in a BYOD system

by Matias Wolff February 14, 2017

There are many benefits for an institution that applies a BYOD system. Reduced costs, better use of the device’s..

Read More

IT management: who’s first, the CIO or the CTO?

by Matias Wolff February 10, 2017

Depending on their size and structure, organizations have a Chief Information Officer (CIO) and a Chief Technology Officer..

Read More

Cyber Security Threats  IT Professionals in Education Face

by Matias Wolff February 1, 2017

If the Death Star's plans could be stolen by a bunch of young rebels, what about the strategic data of your educational..

Read More

Device security: internal threats and how to solve them

by Matias Wolff January 19, 2017

“There is no patch for careless, greedy or stupid.”

This quote was recently said by Chuck Norris. No! Just kidding! It was..

Read More