631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

What to Do Before Your Phone is Stolen, and After

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Stop Financial Permissions
As you’d expect, most financial organizations have a pretty good handle on their security. The problem is that many of those security measures can be worked around within an organization’s mobile device management policy. If a device is lost or stolen, it’s fair to assume that, if they can get into it, the person in possession of the device will have access to whatever financial information that the assigned user would have.

Before you run the risk of having your accounts compromised, contact your financial institutions and explain your position. They will have fraud protection for any and all accounts, and will have a solution to your problem. You should always be mindful of your organization’s finances if there is a chance of a breach, but if you react quickly you will have a much better chance to come out of this situation unscathed.

Eliminate All User Access to Accounts
You’ll want to wipe all the passwords on the device, no matter what type of device it is. If it’s a smart watch, you’ll want to restrict access immediately. On another device, log into the password manager you use (because almost everyone does nowadays) and meticulously delete all passwords from the password manager, or uninstall it from the device if you have administrator access. You also have to be mindful of your saved browser credentials. This will take some time, but will eliminate the problems you could have if the person in possession of the device has access to the accounts on it.

Turn Off Sync
Most browsers sync information to allow users access to the same information on multiple devices. You’ll need to turn this off in order to mitigate the chances that your new passwords are synced and provide access to the new “owner” of your lost or stolen device. Once you’ve wiped your passwords, access your browser’s settings and deselect everything you can and set a new password to encrypt your synced data. You can then start to populate passwords into all relevant applications.

Proactive Security
According to Dell, the average person loses 1.24 devices each year at an average loss of $220.15. It is inevitable that one day something like this is going to befall your company, so being prepared for that eventuality is important. You’ll want to do the following:

  • File away your devices’ serial numbers - Most electronics that change hands under these circumstances cannot be recovered, but if you want to hold hope that yours is in the vast minority, you will want to have as much information as possible. Filing pictures of your device and your device’s serial numbers can be advantageous if the police (or whomever) are able to recover a lost or stolen device.
  • Keep data backed up - Since there is a pretty slim chance you can retrieve a lost or stolen machine, keeping copies of your device’s data will allow you to at least have a copy to use when you are forced to get a new device.

Suffolk Computer Consultants has seen it all. If you would like more information about strategies to help protect your data, give us a call today at 631-905-9617

Taking a Look Inside Android Oreo
Tip of the Week: How to Simplify Your Inventory Ma...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Backup Network Security Tech Term Smartphones Hardware Microsoft Passwords Communication Software Hackers Business Management Business Outsourced IT Ransomware Hosted Solutions Small Business Alert Google Android Productivity Social Media VoIP Wi-Fi Save Money Email Applications Smartphone Microsoft Office Employer-Employee Relationship Data Backup Router Internet Data Recovery Business Intelligence Twitter Computer Patch Management Blockchain Data Settings Analytics VoIP Vulnerability Bandwidth Apps Government IT Services Collaboration IT Support Browser Data Breach Data Management Efficiency Innovation Phishing Virtualization User Tips Miscellaneous Saving Money Excel Internet of Things Office Windows 10 Password Mobile Devices BDR Network Cloud Computing Automation App Politics Gmail Hacking Windows Information Computers Paperless Office Productivity Gadgets Cost Management IT Support Business Continuity Managed IT Services Artificial Intelligence Remote Monitoring Chrome Tip of the week Remote Computing Law Enforcement Virus Website Office 365 Access Control Networking Retail Holiday WiFi Cybercrime Word Scam Spam Workers Compliance Wireless VPN Mobile Device Management Tech Terms How To Battery Wireless Charging Cortana Physical Security Managed IT Service Virtual Assistant Data Protection Company Culture Voice over Internet Protocol Paper Spotify Technology Tips SaaS Hybrid Cloud Tech Support Live Streaming HP Database Reporting Knowledge Staff RAM Files Telephony WannaCry Environment Staffing Hiring/Firing Remote Monitoring and Management Safety Telephone Systems File Sharing Server Management Downloads Backup and Disaster Recovery Marketing Remote Support Ink Dark Web User Tip WhatsApp Document Management Tactics Gadget Work/Life Balance Medical IT Google Drive Comparison Websites Microsoft Teams Information Technology Voice over IP HIPAA e-waste Analysis Managed IT Remote Control User Security Trends SSD Printer Server Amazon Botnet Hosted Solution IT budget PowerPoint Office Tips Automobile Big Data Users Digital Internet Explorer Facebook Shortcut GDPR Specifications Entertainment Managing Stress Biometrics eCommerce Hard Drive disposal Recovery Managed Service Spam Blocking Business Technology Machine Learning A.I. Disaster Recovery Inventory Cleaning Printers Hard Drives Workplace Tips Copy Apple IT Management Sports Maintenance Telecommuting News Edge Threat CrashOverride Multi-Factor Security Conferencing Dongle G Suite Access Licensing Online Shopping Processors Value Server Email Management Sales Telecommute Movies Millennials Lead Generation Mobile Security Plug-In Paste iPhone Antivirus Connectivity Google Maps Cables Telephone System Laptop Printing Content Filtering Bring Your Own Device BYOD Two-factor Authentication Travel Spyware Phone System Tablet Data loss Education Unified Communications Smart Technology Operating System Proactive IT Network Attached Storage Streaming Media Managed Service Provider Augmented Reality Scalability Instagram Wireless Technology 5G DDoS Video Games Money Synergy IBM IaaS Hacker Worker Employer Employee Relationship The Internet of Things Budget Credit Cards Television Fun Customer Relationship Management Competition Emoji Freedom of Information HaaS IP Address Printer Customer Service Emergency Encryption Unified Threat Management Yahoo Mobile Office Upgrade Search Mobile Device Current Events Storage Domains Leadership Vendor Management Computer Care Autocorrect Windows 10 Net Neutrality Error Avoiding Downtime Public Speaking Personal Information Regulation Scheduling Presentation Dark Data Gaming Console Lithium-ion battery Samsung

Newsletter Sign Up