According to FreightWatch International, “the average value of a stolen shipment in transit amounted to over $300,000 in 2013”. Unfortunately these figures continue to dis-improve with LPM Insider reporting that cargo crimes have risen by over 150% in recent years and continue to grow today.

Computer equipment tops the list of attractive goods that thieves strive to get their hands on, but theft is not the only problem. It has been widely reported that servers and networking equipment have been intercepted in-transit to compromise the data that will be stored on them in future. Adopting security practices throughout the entire transit of computer equipment is imperative. It means both the owners and transport company can rest assured that these high valued goods arrive at their destination safely and tamper free.

Global brand Google have adopted a novel approach to the security of their servers, whereby they “have designed custom chips, including a hardware security chip that is put onto servers and peripherals, allowing the company to securely identify and authenticate legitimate Google devices at the hardware level”.

You must be aware that even computer equipment leaving a data centre may have significant value in the second or third life deployments. In other words, they still warrant the same care and attention as new stock.

The safety and security of your computer equipment is at the heart of what ATC does. Our high-specification fleet has satellite and GPS tracking installed on all trucks and trailers, including anti-tamper countermeasures, ensuring that your equipment can be tracked at all times. We don’t believe in trans-shipping. Instead, we ensure that your equipment travels in the same vehicle for the entire journey, we will even bring the equipment to its final location and complete set up.

As well as working with a logistics company that shares these concerns for the security of your shipment, what else should a company do to protect their equipment during transit? The key concepts are minimising risk and maximising protection. Here are a few things to consider:

  • Ensure that all goods are packed within a sturdy container that is water and shock resistant.
  • Avoid displaying logos or branding prominently on the packaging which makes the equipment easily identifiable.
  • Work with your logistics partner to design routes that minimise opportunities for theft or tampering.
  • Consider using security tape that will indicate if the package has been tampered with.

Don’t let security in transit be a blind spot – take action now. Find out more about our computer transport services here or alternatively you can contact me at