This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

NHS trust recovers stolen laptops thanks to Absolute Software

Share this article:

The Lancashire Care NHS Foundation Trust has managed to recover four stolen laptops.

The laptops and desktops were stolen from residential houses, hotel rooms and cars while one of the thefts occurred at the trust's new premises.

Aided by Absolute Software and its Computrace product, the missing computers were tracked and located, allowing the Absolute Theft Recovery Team to work with local police to recover the devices and make arrests.

As soon as the thieves connected to the internet, Computrace sent an alert to the Absolute Monitoring Centre, allowing the device to be tracked and located. Within a couple of months, the laptop was found in the possession of an innocent purchaser and was returned to the organisation.

Another arrest was made at a residential home, where a stolen laptop was uncovered in the thief's kitchen cupboard. The thief was charged at the scene and found guilty in court.

Alan Boardman, IM&T security systems engineer at Lancashire Care NHS Foundation Trust, was called to give evidence for the case, along with one of the theft recovery officers from Absolute Software. He said: “With such a high percentage of remote workers moving between different locations, we have to be realistic about the security issues this presents. Theft is unfortunately inevitable.

“We decided to tackle this threat by implementing Computrace. The recent recoveries were all found within a matter of weeks or months thanks to the software.”

Derek Skinner, theft recovery services manager at Absolute Software, said: “Laptops are candy for today's thief, particularly those that store valuable information. It's essential for organisations to have security measures in place to deter thieves and prevent the worst from happening. Our strong partnership with the Lancashire Care NHS Foundation Trust shows that thieves can easily be caught out and punished for their crime.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Microsoft warns on yet another zero-day security flaw

Microsoft warns on yet another zero-day security flaw

Microsoft has warned Windows users about a zero-day security issue with malicious PowerPoint documents being emailed to recipients. The software giant is working on a patch for the problem.

Google launches FIDO-compliant 2FA USB key for Chrome and Gmail

Google launches FIDO-compliant 2FA USB key for Chrome ...

Google has souped up its two-factor authentication (2FA) login process with the launch of Security Key, a physical USB that only works after verifying the login site is truly a ...

Evolving TorrentLocker ransomware generating big money

Evolving TorrentLocker ransomware generating big money

The TorrentLocker ransomware has returned with a vengeance and is starting to bring in big money for its operators.