(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

What to Do Before Your Phone is Stolen, and After

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Stop Financial Permissions
As you’d expect, most financial organizations have a pretty good handle on their security. The problem is that many of those security measures can be worked around within an organization’s mobile device management policy. If a device is lost or stolen, it’s fair to assume that, if they can get into it, the person in possession of the device will have access to whatever financial information that the assigned user would have.

Before you run the risk of having your accounts compromised, contact your financial institutions and explain your position. They will have fraud protection for any and all accounts, and will have a solution to your problem. You should always be mindful of your organization’s finances if there is a chance of a breach, but if you react quickly you will have a much better chance to come out of this situation unscathed.

Eliminate All User Access to Accounts
You’ll want to wipe all the passwords on the device, no matter what type of device it is. If it’s a smart watch, you’ll want to restrict access immediately. On another device, log into the password manager you use (because almost everyone does nowadays) and meticulously delete all passwords from the password manager, or uninstall it from the device if you have administrator access. You also have to be mindful of your saved browser credentials. This will take some time, but will eliminate the problems you could have if the person in possession of the device has access to the accounts on it.

Turn Off Sync
Most browsers sync information to allow users access to the same information on multiple devices. You’ll need to turn this off in order to mitigate the chances that your new passwords are synced and provide access to the new “owner” of your lost or stolen device. Once you’ve wiped your passwords, access your browser’s settings and deselect everything you can and set a new password to encrypt your synced data. You can then start to populate passwords into all relevant applications.

Proactive Security
According to Dell, the average person loses 1.24 devices each year at an average loss of $220.15. It is inevitable that one day something like this is going to befall your company, so being prepared for that eventuality is important. You’ll want to do the following:

  • File away your devices’ serial numbers - Most electronics that change hands under these circumstances cannot be recovered, but if you want to hold hope that yours is in the vast minority, you will want to have as much information as possible. Filing pictures of your device and your device’s serial numbers can be advantageous if the police (or whomever) are able to recover a lost or stolen device.
  • Keep data backed up - Since there is a pretty slim chance you can retrieve a lost or stolen machine, keeping copies of your device’s data will allow you to at least have a copy to use when you are forced to get a new device.

OnSite I.T. has seen it all. If you would like more information about strategies to help protect your data, give us a call today at (403) 210-2927

Taking a Look Inside Android Oreo
Tip of the Week: How to Simplify Your Inventory Ma...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Productivity Privacy Internet Smartphones Cybersecurity Malware Efficiency Hardware Android Microsoft Communication Mobile Device Browser Cloud Network Wi-Fi Ransomware Email Data Passwords Small Business Google IT Support Communications Mobile Devices Collaboration Managed IT services IT Services Applications Software Windows 10 Holiday Data recovery Users Innovation Backup Internet of Things Data Backup Saving Money Hosted Solutions Business Management Wireless Managed IT Services VoIP Smartphone Information Cloud Computing Blockchain Marketing Employer-Employee Relationship Hackers Workplace Tips Networking Business Intelligence Outsourced IT Social Media Business Virtual Assistant Cortana Access Control Password Bandwidth Mobility Computer VPN Data Protection Remote Monitoring and Management BDR Cost Management Apps Medical IT Phishing Save Money Microsoft Office Data Breach Data Management Patch Management Computers Excel Analytics Router Wireless Charging Automation Managed Service Virtualization Gmail Tech Terms Remote Computing Miscellaneous Artificial Intelligence Compliance Government Managed IT Service Connectivity Physical Security Backup and Disaster Recovery Managing Stress Eliminating Downtime Machine Learning Paper Law Enforcement Telephony Proactive IT Conferencing Healthcare Digital iPhone Workers Operating System Value Vulnerability Staff Streaming Media Dark Web Laptop SSD G Suite Business Technology BYOD Ink Reporting Tip of the week Unified Communications Authentication Voice over IP Troubleshooting Settings Maintenance Office Edge Downloads Error Millennials IT Management Training Spyware Facebook Bring Your Own Device Wireless Internet WannaCry Telecommute Safety PowerPoint User Tip RAM Authorization File Sharing Update Battery Server Management Internet Explorer Analysis Content Filtering Trends Gadgets Database Amazon Security Cameras HP Websites Twitter Environment Hybrid Cloud Sales Help Desk HIPAA Data loss Sports SaaS Technology Tips Big Data Microsoft Teams eCommerce Outlook Threat Office 365 A.I. Touchscreen Chrome Cybercrime Hard Drives Comparison Word Document Management IT budget Inventory e-waste Cables Tablet Business Continuity Hard Drive Virus GDPR How To Upgrade Company Culture User Security Profitability Lead Generation Printing Server Movies Microsoft Office 365 Online Shopping Network Attached Storage Tactics Plug-In Specifications Wearables Paperless Office Dongle Apple Telecommuting Mobile Security Spam disposal Voice over Internet Protocol Knowledge Certification Processors Antivirus Storage Windows 10 Mobile Device Management Regulation Public Speaking Printers Alert Two-factor Authentication Managed Service Provider Presentation Lithium-ion battery Augmented Reality Hiring/Firing Data Security Tech Support Wireless Technology 5G IBM Fun The Internet of Things Productivity Hacker Personal Information Budget Remote Monitoring Customer Relationship Management Competition Quick Tips IP Address Website Customer Service Search Mobile Office Domains Disaster Recovery