631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

What to Do Before Your Phone is Stolen, and After

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Stop Financial Permissions
As you’d expect, most financial organizations have a pretty good handle on their security. The problem is that many of those security measures can be worked around within an organization’s mobile device management policy. If a device is lost or stolen, it’s fair to assume that, if they can get into it, the person in possession of the device will have access to whatever financial information that the assigned user would have.

Before you run the risk of having your accounts compromised, contact your financial institutions and explain your position. They will have fraud protection for any and all accounts, and will have a solution to your problem. You should always be mindful of your organization’s finances if there is a chance of a breach, but if you react quickly you will have a much better chance to come out of this situation unscathed.

Eliminate All User Access to Accounts
You’ll want to wipe all the passwords on the device, no matter what type of device it is. If it’s a smart watch, you’ll want to restrict access immediately. On another device, log into the password manager you use (because almost everyone does nowadays) and meticulously delete all passwords from the password manager, or uninstall it from the device if you have administrator access. You also have to be mindful of your saved browser credentials. This will take some time, but will eliminate the problems you could have if the person in possession of the device has access to the accounts on it.

Turn Off Sync
Most browsers sync information to allow users access to the same information on multiple devices. You’ll need to turn this off in order to mitigate the chances that your new passwords are synced and provide access to the new “owner” of your lost or stolen device. Once you’ve wiped your passwords, access your browser’s settings and deselect everything you can and set a new password to encrypt your synced data. You can then start to populate passwords into all relevant applications.

Proactive Security
According to Dell, the average person loses 1.24 devices each year at an average loss of $220.15. It is inevitable that one day something like this is going to befall your company, so being prepared for that eventuality is important. You’ll want to do the following:

  • File away your devices’ serial numbers - Most electronics that change hands under these circumstances cannot be recovered, but if you want to hold hope that yours is in the vast minority, you will want to have as much information as possible. Filing pictures of your device and your device’s serial numbers can be advantageous if the police (or whomever) are able to recover a lost or stolen device.
  • Keep data backed up - Since there is a pretty slim chance you can retrieve a lost or stolen machine, keeping copies of your device’s data will allow you to at least have a copy to use when you are forced to get a new device.

Suffolk Computer Consultants has seen it all. If you would like more information about strategies to help protect your data, give us a call today at 631-905-9617

Taking a Look Inside Android Oreo
Tip of the Week: How to Simplify Your Inventory Ma...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Productivity Microsoft Backup Smartphones Hardware Passwords Communication Hosted Solutions Hackers Internet VoIP Google Business Management Ransomware Email Android Small Business Software Outsourced IT Browser Efficiency User Tips Business Wi-Fi Alert Save Money Social Media Employer-Employee Relationship Collaboration Computer Data Router Bandwidth Data Backup Microsoft Office Data Recovery Twitter Windows 10 Cloud Computing Innovation Business Intelligence Miscellaneous Saving Money Applications Smartphone Data Management Excel Mobile Devices Internet of Things Office Phishing IT Support Virtualization Network Access Control Mobile Device Automation Analytics Apps VoIP Gadgets Password Workplace Tips BDR Data Breach Users Managed IT Services Blockchain Settings Government Patch Management IT Services Vulnerability IT Support Spam Cost Management Wireless Computers Dark Web Mobile Device Management Remote Monitoring VPN Workers Law Enforcement Artificial Intelligence Chrome Tip of the week Remote Computing Holiday Information Networking WiFi Cybercrime Virus Company Culture Scam Politics Word Productivity Marketing Battery Tech Terms Cortana How To Windows Office 365 App Compliance Wireless Charging Business Continuity Website Virtual Assistant Data Protection Hacking Physical Security Managed IT Service Gmail Paperless Office Retail WannaCry Environment Proactive IT Telephone Systems File Sharing Maintenance Server Management Downloads Work/Life Balance Troubleshooting Files Telephony Cleaning Printers CrashOverride Ink Managed IT Touchscreen User Tip Access Backup and Disaster Recovery Voice over Internet Protocol Remote Support Document Management Tactics Botnet Reporting Google Drive Comparison Websites Microsoft Teams Office Tips Automobile WhatsApp HIPAA e-waste Remote Monitoring and Management Remote Control User Security Antivirus Two-factor Authentication Trends Update Voice over IP IT budget PowerPoint Microsoft Office 365 BYOD SSD Hosted Solution Phone System Digital Internet Explorer Hard Drives Medical IT Specifications Education Smart Technology Managing Stress Hard Drive disposal Analysis Spam Blocking Business Technology Tech Support Machine Learning A.I. Outlook eCommerce Amazon Copy Apple IT Management Sports Server Authentication Telecommuting SaaS Safety Inventory Edge Threat GDPR Multi-Factor Security Conferencing Dongle G Suite Google Maps News Processors Value Managed Service Email Management Sales Telecommute Movies Licensing Online Shopping Staffing Paste iPhone Connectivity Authorization Millennials Lead Generation Mobile Security Gadget Big Data Laptop Printing Storage Content Filtering Information Technology Bring Your Own Device Telephone System Spyware Tablet Data loss Unified Communications Spotify Travel Operating System Plug-In Network Attached Storage Streaming Media Printer Server Facebook Shortcut Paper Hiring/Firing Error Entertainment Biometrics Technology Tips Hybrid Cloud Cables HP Database Knowledge Disaster Recovery Staff RAM Live Streaming Recovery Fun Current Events Windows 10 Leadership Freedom of Information Public Speaking Computer Care Presentation Net Neutrality Encryption Personal Information Lithium-ion battery Yahoo Augmented Reality Search Emergency Gaming Console Wireless Technology 5G IBM Vendor Management Scalability The Internet of Things Autocorrect Hacker Synergy Budget Avoiding Downtime Video Games Dark Data Worker Customer Relationship Management Scheduling IaaS Competition Credit Cards Television IP Address Samsung Managed Service Provider Emoji DDoS Printer Customer Service Instagram Quick Tips HaaS Upgrade Money Mobile Office Domains Regulation Unified Threat Management Employer Employee Relationship

Newsletter Sign Up