Skip to Content Skip to footer
Welcome to the Kensington site. We've directed you here based on your current location.


  • No Suggestions

Site Pages

Chevron Icon

The Importance of Locking Down Multiple Devices in the Office

  • September 12, 2017
  • Topics: Locks

Kensington Outlines the Risks Associated with Leaving Employee Equipment Unattended in Heterogeneous Office Environments and the Best First Line of Defense to Protect Valuable Data

Kensington®, a worldwide leader of desktop computing and mobility solutions for IT, business and home office professionals and The Professionals’ Choice, has released an article: Locking Multiple Devices for IT administrators that outlines the critical importance of locking down multiple devices in the office, where more IT theft takes place than many realize. Implementing a first line of defense with physical solutions is a valuable step towards preventing theft that can have a devastating impact on a company, but there are considerations with multiple devices across what is often a heterogeneous environment.

Confidential data leaked from a company device can expose an entire enterprise, costing the company contacts, intellectual property and even clients. A security breach of this nature can scare shareholders, potential investors and customers, all while disrupting workflow and decreasing productivity when employees are without their laptops when lost or stolen.

Cyber security cannot stop devices, and the data inside them, from being stolen from work and employee environments, but something as simple as a trusted physical security solution can prevent nightmare scenarios from becoming reality. With so much at stake, there are many considerations with physical security, such as how to secure multiple devices across an entire fleet of what is often a heterogeneous environment. Convertible laptops, 2 in 1 machines, hard drives and monitors, desktop sets, POS devices, printers, projectors and more can prove to be a daunting challenge for the IT manager responsible for protecting this equipment.

Advanced security options are available to IT managers looking for physical security solutions that are easy and optimized for all devices, while offering strong levels of protection.

“Different industries have different requirements and should consider custom keying solutions that allow an appropriate administrative level of IT control over equipment, while helping employees safeguard against theft and avoid downtime due to misplaced keys,” said Louie Yao, Global Product Manager, Kensington and author of the guide. “In many instances, an organization will need a mix of two, or even three custom key solutions to satisfy industry standard requirements. Knowing which physical solutions are available to meet these requirements is a valuable step towards implementing the right level of physical security for the greatest possible data protection.”

Notes to editors

About Kensington

Kensington is a leading provider of desktop and mobile device accessories, trusted by IT, educators, business and home office professionals around the world for more than 35 years. Kensington products empower people to dynamically interact with content, creating a better working experience for productive performance. In both office and mobile environments, Kensington’s extensive portfolio of award-winning products provides trusted security, desktop productivity innovations, and ergonomic well-being. Our core competencies in engineering, industrial design, product quality and responsive customer support make Kensington The Professionals’ Choice.

Headquartered in San Mateo, California, Kensington operates as the technology division of ACCO Brands (NYSE: ACCO), one of the world’s largest designers, marketers and manufacturers of branded business, academic and consumer products, sold in more than 100 countries across the globe.

Kensington is the inventor and worldwide leader in laptop security locks, the acknowledged leader of Trackball innovation and offers a broad range of premium-branded desktop productivity solutions.