Resources

The Evolution of Mobile Theft & Loss | MTLR 2020

nico@preyhq.com
Nico P.
Mar 13, 2020
0 minute read
The Evolution of Mobile Theft & Loss | MTLR 2020

Did you know that the average time in which a person recovers a lost / stolen laptop, phone, or tablet os 4.6 days? Or that home invasions that result in computer theft are on the rise?

Learn this and more on the second edition of the Mobile Theft & Loss Report (which you can read here!), a yearly report we generate at Prey based on our user's recovery stories and anonymous data.

With this information, we discovered insights on how the theft of phones and laptops take place; as well as the loss of other mobile devices.

What's New in the Report

The second edition of MTLR introduces the first year-by-year data on device theft; as well as new information on average recovery times, and emerging threat trends.

Year-by-year Changes in Mobile Theft

This time, MTLR presents a year-by-year increase in break-in device theft events, with Home Invasions and Business Break-ins growing by +5.17% and +2.11 respectively; together with a decrease in device theft and pickpockets, -1.88% and -1.65% respectively.

A surprising trend that was displayed is how much theft-related events in schools and universities grew. Pickpockets in these locations grew by +6.37%, whereas common robbery went up by +10.51%.

A New Type of Threat: Opportunists

When the team filtered the content of each individual story, a new emerging threat group was identified: opportunists. These are not your average thief.

Opportunists are average people that share contextual relationships with the device owners, like at school, at work, or being their friend's friend. These characters steal devices when an opportunity for it presents. They tend to be isolated events in which, for example, a dorm neighbor finds an open door and sees the chance to take a laptop with him.

These actors act silently, and under the protection of the device owner's own low suspicion over them. These facts make them a very difficult target to predict.

Read the Complete Report

Grab a copy of this year's MTLR to know mobile device theft and loss thoroughly, with a year-by-year comparison to last year's report that shows the tendency in each theft type, and affected location. You will find:

  • Theft and loss statistics.
  • Most affected locations and threats.
  • Targeted devices and recovery times.

We will continue to develop new information on our industry's trends, and to refine our analysis to ensure we keep general awareness on theft tactics accurate.

Frequently asked questions

What is the technology strategy framework?

A technology strategy framework is essential for businesses to effectively leverage technology to enhance operational efficiency, customer experience, and foster innovation while managing risks. This framework is often referred to as IT strategy or digital strategy.

What is an IT strategy framework?

An IT strategy framework is essential for aligning technology initiatives with business objectives, providing a clear structure to achieve strategic goals. By implementing this framework, organizations can ensure that their IT investments effectively support their overall business strategy.

Why is aligning IT goals with business objectives important?

Aligning IT goals with business objectives is crucial because it ensures that IT initiatives directly support the overall business strategy, driving growth and efficiency. This alignment facilitates better resource allocation and maximizes the impact of technology on business performance.

How can emerging technologies be leveraged in an IT strategy?

Leveraging emerging technologies in your IT strategy can drive innovation and create competitive advantages through the development of new business models and increased market value. Embracing these technologies ensures your organization stays ahead in a rapidly evolving landscape.

What are some common challenges in IT strategy implementation?

Common challenges in IT strategy implementation include a lack of alignment with organizational goals, resistance to change from stakeholders, and the tendency to adopt new technologies without clear value, often referred to as "shiny object syndrome." Addressing these challenges is crucial for successful execution.

Discover

Prey's Powerful Features

Protect your devices with Prey's comprehensive security suite.