Answer yes if your organisation allows the use of laptop devices for work purposes. In the notes, please describe whether these are typically company owned or personal devices.
Organisation-provisioned endpoint devices, such as laptops, mobile devices, and desktops, provide employees with flexibility while maintaining access to business data and services.
However, because these devices are often used outside an organisation’s physical premises, they face a higher risk of being lost, stolen, or compromised. Therefore, it is important that full-disk encryption is enabled on all organisation-provisioned endpoint devices to mitigate the risk of a data breach.
Many endpoint devices now come with full-disk encryption as standard, but this should be confirmed before these devices are provisioned to staff.
Current versions of iOS and Android provide built-in disk or file-level encryption, though implementations vary by platform. Where possible, you should manage these devices using a Mobile Device Management (MDM) or Unified Endpoint Management (UEM) solution to enforce encryption policies and other security configurations, ensuring the encryption features are fully effective.
If you manage your devices centrally (for example, by using an Active Directory), you can enforce device encryption through the use of Group Policies.If you do not manage your devices centrally, a local administrator should confirm and enable device encryption for each device before it is provisioned to staff. This should form part of your secure configuration checklist. For more information on how to enable encryption, see Microsoft's support article here.
If you manage your devices centrally (for example, by using Microsoft's Endpoint Configuration Manager), you can enforce device encryption throughout the estate.If you do not manage your devices centrally, a local administrator should confirm and enable device encryption for each device before it is provisioned to staff. This should form part of your secure configuration checklist. For more information on how to enable encryption, see Apple's support article here.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.