631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

What to Do Before Your Phone is Stolen, and After

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Stop Financial Permissions
As you’d expect, most financial organizations have a pretty good handle on their security. The problem is that many of those security measures can be worked around within an organization’s mobile device management policy. If a device is lost or stolen, it’s fair to assume that, if they can get into it, the person in possession of the device will have access to whatever financial information that the assigned user would have.

Before you run the risk of having your accounts compromised, contact your financial institutions and explain your position. They will have fraud protection for any and all accounts, and will have a solution to your problem. You should always be mindful of your organization’s finances if there is a chance of a breach, but if you react quickly you will have a much better chance to come out of this situation unscathed.

Eliminate All User Access to Accounts
You’ll want to wipe all the passwords on the device, no matter what type of device it is. If it’s a smart watch, you’ll want to restrict access immediately. On another device, log into the password manager you use (because almost everyone does nowadays) and meticulously delete all passwords from the password manager, or uninstall it from the device if you have administrator access. You also have to be mindful of your saved browser credentials. This will take some time, but will eliminate the problems you could have if the person in possession of the device has access to the accounts on it.

Turn Off Sync
Most browsers sync information to allow users access to the same information on multiple devices. You’ll need to turn this off in order to mitigate the chances that your new passwords are synced and provide access to the new “owner” of your lost or stolen device. Once you’ve wiped your passwords, access your browser’s settings and deselect everything you can and set a new password to encrypt your synced data. You can then start to populate passwords into all relevant applications.

Proactive Security
According to Dell, the average person loses 1.24 devices each year at an average loss of $220.15. It is inevitable that one day something like this is going to befall your company, so being prepared for that eventuality is important. You’ll want to do the following:

  • File away your devices’ serial numbers - Most electronics that change hands under these circumstances cannot be recovered, but if you want to hold hope that yours is in the vast minority, you will want to have as much information as possible. Filing pictures of your device and your device’s serial numbers can be advantageous if the police (or whomever) are able to recover a lost or stolen device.
  • Keep data backed up - Since there is a pretty slim chance you can retrieve a lost or stolen machine, keeping copies of your device’s data will allow you to at least have a copy to use when you are forced to get a new device.

Suffolk Computer Consultants has seen it all. If you would like more information about strategies to help protect your data, give us a call today at 631-905-9617

Taking a Look Inside Android Oreo
Tip of the Week: How to Simplify Your Inventory Ma...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Network Security Cybersecurity Productivity User Tips Malware Managed IT Services Tech Term Backup Smartphones Microsoft Communications Hackers Efficiency Hardware Internet Passwords Communication Software Android Outsourced IT Browser Hosted Solutions Business Ransomware Email Google Business Management Small Business Mobile Device Data Backup VoIP Wi-Fi Data Recovery Applications Alert Microsoft Office Collaboration IT Support Innovation Save Money Social Media Smartphone IT Services Internet of Things Windows 10 Network Cloud Computing Data Holiday Apps Bandwidth Router Password Managed IT Services Users Miscellaneous Twitter Access Control Saving Money Wireless Mobile Devices Employer-Employee Relationship Computer Business Intelligence Patch Management VoIP Information Settings Vulnerability Marketing Gadgets Data Breach Business Continuity Networking Workplace Tips Government Word Excel Office BDR Data Management Blockchain Automation Phishing Virtualization Analytics WiFi Cybercrime Gmail Scam Computers Productivity Medical IT Windows Artificial Intelligence Dark Web Mobility Battery Website Office 365 Managed Service Cortana Chrome Facebook Tip of the week Remote Computing Retail App Virus Compliance Hacking Spam Mobile Device Management Workers Paperless Office Tech Terms Connectivity VPN IT Support Cost Management How To BYOD Remote Monitoring Virtual Assistant Company Culture Law Enforcement Wireless Charging Data Protection Politics Remote Monitoring and Management Physical Security Managed IT Service Environment Safety Healthcare Server Management Downloads Hard Drives Microsoft Office 365 WannaCry Certification Ink Knowledge Backup and Disaster Recovery Live Streaming Staffing Document Management Tactics Telephone Systems File Sharing Analysis Websites Microsoft Teams Files Telephony Server Outlook HIPAA e-waste Remote Support Google Maps Gadget Amazon Data Security Trends User Tip Information Technology Authentication IT budget PowerPoint Google Drive Big Data Comparison GDPR SSD WhatsApp Profitability Digital Internet Explorer Remote Control User Security Managing Stress Voice over IP Printer Server Hard Drive disposal Hosted Solution Shortcut Machine Learning A.I. Entertainment Biometrics Authorization Recovery Spotify Training IT Management Sports Upgrade Specifications Disaster Recovery Storage Inventory Eliminating Downtime Edge Threat Spam Blocking Business Technology Maintenance Dongle G Suite eCommerce Cleaning Printers Processors Value Copy Apple CrashOverride Plug-In Telecommute Movies Telecommuting Hiring/Firing Access Cables Security Cameras Multi-Factor Security Conferencing Error Lead Generation Mobile Security News Wireless Internet Laptop Printing Email Management Sales Antivirus Bring Your Own Device Licensing Online Shopping Work/Life Balance Spyware Paste iPhone Proactive IT Data loss Unified Communications Two-factor Authentication Millennials Managed IT Troubleshooting Telephone System Office Tips Phone System Automobile Voice over Internet Protocol Wearables Network Attached Storage Streaming Media Content Filtering Education Smart Technology Botnet Touchscreen Operating System Help Desk Paper Tablet Reporting Technology Tips Hybrid Cloud Travel HP Database Staff RAM Tech Support SaaS Update Scalability IBM The Internet of Things Synergy Search Hacker Video Games Worker Budget IaaS Vendor Management Competition Credit Cards Customer Relationship Management Television Autocorrect Avoiding Downtime Emoji IP Address Printer Dark Data HaaS Scheduling Samsung Customer Service Unified Threat Management Managed Service Provider Mobile Office Domains DDoS Emergency Instagram Current Events Leadership Money Quick Tips Employer Employee Relationship Windows 10 Public Speaking Fun Regulation Computer Care Presentation Net Neutrality Freedom of Information Personal Information Lithium-ion battery Augmented Reality Gaming Console Wireless Technology 5G Yahoo Encryption

Newsletter Sign Up