Blog
home
  • Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to https://www.4datanet.com/

What to Do Before Your Phone is Stolen, and After

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Stop Financial Permissions
As you’d expect, most financial organizations have a pretty good handle on their security. The problem is that many of those security measures can be worked around within an organization’s mobile device management policy. If a device is lost or stolen, it’s fair to assume that, if they can get into it, the person in possession of the device will have access to whatever financial information that the assigned user would have.

Before you run the risk of having your accounts compromised, contact your financial institutions and explain your position. They will have fraud protection for any and all accounts, and will have a solution to your problem. You should always be mindful of your organization’s finances if there is a chance of a breach, but if you react quickly you will have a much better chance to come out of this situation unscathed.

Eliminate All User Access to Accounts
You’ll want to wipe all the passwords on the device, no matter what type of device it is. If it’s a smart watch, you’ll want to restrict access immediately. On another device, log into the password manager you use (because almost everyone does nowadays) and meticulously delete all passwords from the password manager, or uninstall it from the device if you have administrator access. You also have to be mindful of your saved browser credentials. This will take some time, but will eliminate the problems you could have if the person in possession of the device has access to the accounts on it.

Turn Off Sync
Most browsers sync information to allow users access to the same information on multiple devices. You’ll need to turn this off in order to mitigate the chances that your new passwords are synced and provide access to the new “owner” of your lost or stolen device. Once you’ve wiped your passwords, access your browser’s settings and deselect everything you can and set a new password to encrypt your synced data. You can then start to populate passwords into all relevant applications.

Proactive Security
According to Dell, the average person loses 1.24 devices each year at an average loss of $220.15. It is inevitable that one day something like this is going to befall your company, so being prepared for that eventuality is important. You’ll want to do the following:

  • File away your devices’ serial numbers - Most electronics that change hands under these circumstances cannot be recovered, but if you want to hold hope that yours is in the vast minority, you will want to have as much information as possible. Filing pictures of your device and your device’s serial numbers can be advantageous if the police (or whomever) are able to recover a lost or stolen device.
  • Keep data backed up - Since there is a pretty slim chance you can retrieve a lost or stolen machine, keeping copies of your device’s data will allow you to at least have a copy to use when you are forced to get a new device.

Data Net has seen it all. If you would like more information about strategies to help protect your data, give us a call today at (760) 466-1200

Exciting Changes at Data Net!
Tip of the Week: How to Simplify Your Inventory Ma...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 26, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication Hackers IT Support Malware Google Smartphones Hardware Email Innovation Cloud Small Business User Tips Microsoft VoIp Software Users Communications Workplace Tips Managed IT Services Cybersecurity Mobile Device Computer Business Collaboration Internet Tech Term Hosted Solutions Mobile Devices Business Management Android Ransomware Outsourced IT Cloud Computing Miscellaneous Social Media Windows 10 Passwords Backup Phishing IT Services Managed Service Smartphone Network Information Browser Covid-19 Data Backup Upgrade Apps Wi-Fi Saving Money Data recovery Facebook Applications Networking Internet of Things Wireless Microsoft Office Windows Bandwidth Holiday Gadgets Automation Employer-Employee Relationship Access Control Chrome Gmail Quick Tips Marketing Data Breach Apple Remote Work VPN Compliance BDR Managed IT services Blockchain Patch Management Office 365 Employee-Employer Relationship Save Money Laptop Health Word Voice over Internet Protocol Conferencing Router Value Going Green Analytics Managed IT Service Business Intelligence Mobile Office Computers Bring Your Own Device Content Filtering RAM Server Remote Monitoring and Management Data Protection Batteries Settings Excel Windows 7 Twitter Medical IT Telephony Mobile Device Management Artificial Intelligence Cybercrime Scam Password Business Continuity Connectivity Business Technology Company Culture Disaster Recovery Payment Cards Battery Social Network iPhone Cortana Paperless Office Remote Monitoring Education Remote Wireless Charging Government Remote Computing Healthcare Net Neutrality Data Management How To Processor Virus Retail G Suite Office Virtual Assistant Telephone System Virtualization Data Security Tech Terms Cost Management Physical Security Mobility Cryptocurrency Project Management Remote Support Regulations Compliance Update Taskbar Data loss Hosted Desktop Sports Reporting Cleaning Authorization Hard Disk Drive Multi-Factor Authentication Database Alert Managed Service Provider Vulnerability Threat Personal Information Big Data Technology Tips Trends Error Tablet Managed Services Provider Network Attached Storage Environment Amazon Training Benchmarks Edge Mobile Search IT budget Meetings Hybrid Cloud Outlook WannaCry Help Desk National Security HP Spam Firewall User Security Management Microsoft Teams Comparison Video Co-Managed IT Printing Workers E-Commerce Bitcoin A.I. Electronic Health Records Vendor e-waste Tip of the week Security Cameras Risk Management Dongle Recovery Time Management Insurance Inventory Printer Cables Profitability HIPAA Document Management Antivirus Congratulations Profiles SaaS Voice over IP Backup and Disaster Recovery Botnet Remote Working Specifications Customer Service Holidays Machine Learning Tactics Travel Humor Paper File Sharing Millennials Payment Movies Touchscreen Knowledge disposal Wearables Virtual Reality Chrome OS File Management IT Management Mobile Security Website Encryption Eliminating Downtime Hard Drive Updates Staff WhatsApp Shadow IT GDPR Hard Drives Managing Stress Lead Generation OneNote Memes Ink instant Messaging Threats Microsoft Office 365 Employees Distribution Server Management Licensing Virtual Private Network Maintenance Plug-In News eCommerce Current Events Operating System Innovations BYOD Processors Certification Digital Websites Computer Repair Streaming Media Storage Scams SSD PCI DSS Troubleshooting Windows Server 2008 R2 Telecommute Live Streaming IT PowerPoint Vulnerabilities Remote Workers Unified Communications Authentication Solid State Drive Fleet Management Tech Support Customer Relationship Management Internet Explorer Proactive IT Law Enforcement Telecommuting Recycling Sales Online Shopping Human Resources Wireless Internet User Tip Spyware Display Safety IT Service Downloads Dark Web Thank You Analysis Financial Printers Regulation WiFi

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123