Contact us today!

Network Solutions Unlimited Blog

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

This situation is far too familiar, and with the rising use of personal devices for work purposes, it has led to too many businesses becoming vulnerable to threats. Fortunately, there are steps to help mitigate the damage if your devices are ever absconded with.

1. Suspend any Financial Permissions to the Device
One of the biggest benefits of mobile and online banking and finance management is the security that financial institutions enforce before allowing access. However, many of the security measures are easily circumvented by a user and their device’s password management. If a device is stolen, there’s a good chance that the thief will still be allowed to access many online accounts and make purchases on your (or your company’s) dime if password management is activated.

If your online accounts show signs of unauthorized use, reach out to the bank or lender immediately and explain the situation. They should have a fraud department whose job it is to handle exactly this kind of circumstance, and they will most likely refund the lost money. You should still babysit your finances, however, as the bank might not initially pay attention to smaller transactions.

2. Wipe ALL Passwords
Yes, ALL passwords. Whether it was a mobile device or a laptop that was stolen from you, you need to access all accounts literally as soon as humanly possible and change every single password you have. On a second device, log into your browser and access any password manager you may be using, including the browser’s native capabilities or a utility like LastPass. This is unfortunate, but necessary: you need to systematically go through and delete every password from the password manager, uninstalling it. You also need to go to every site you have an account with and change your credentials to it. While this in undeniably a pain to deal with, it is less of a pain than a stolen account.

3. Make Sure Browser Sync is Deactivated
If you happen to use a browser like Chrome or Firefox across multiple devices, you need to disable it before you start changing your passwords and credentials. Otherwise, any of your changes will automatically transfer over to the stolen device, rendering any of your efforts to block access thus far useless. So, once you’ve wiped the password for each account you have, turn off syncing. In Chrome, you can do this by accessing Settings > Advanced sync settings > Choose what to sync. Deselect everything and set a new password to encrypt your synced data. Then you are safe to start the password resetting process.

Secondary Measures
When it comes to finding a device that has been stolen, there are a few ways to make it easier to recover afterwards.

Note Your Serial Numbers
One of the most difficult parts of recovering a stolen laptop (or other device) that the police have recovered is proving that it belongs to you. However, if you keep a record of all of your devices and their serial numbers, you will be prepared to stake a claim to your devices once they are recovered.

To find your device’s identifying information, access Control Panel > System and Security > See the name of this computer. From there, you can take a screenshot that you can keep for your records.

You can also take pictures of the device itself, recording any identifying features and the like that could help to confirm that, should the computer be stolen and recovered, it belongs to you.

Keep Your Data Backup Updated
Unfortunately, many thieves know that it just makes more sense to wipe a stolen computer as quickly as possible - it makes it that much harder to find, after all. Plus, many thieves will use a secondhand shop as an unwitting fence to get rid of the hot device. These stores also will wipe the device before selling it. While this is good for your data security, it isn’t great for your data continuity… unless you’ve taken precautions and have maintained a data backup. Having a data backup means that, even if the thief wipes your valuable data, you haven’t lost the most valuable part of the device.

If your business finds itself in one of these positions, and you need assistance with any of these steps, we can help. Reach out to Network Solutions Unlimited today at 217-428-6449.

Bias Can Impact Your Business from Within
Tech Term: Router


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Telephone Systems Save Money Conferencing Encryption Computer Workplace Tips Hosted Solutions Proactive IT Data Management USB Spyware Financial Technology Hard Drives IT Services Google Windows 10 Mobility Root Cause Analysis Health Data storage Business Intelligence iPhone Advertising Data Security HBO Virtualization Identities IT solutions Retail Compliance Data Privacy Mobile Devices Google Docs Privacy Password IoT Keyboard Productivity Dark Web Managed IT Services Windows 10 BYOD Storage Technology Settings Content Filtering Cast Congratulations Electronic Medical Records Outsourced IT Chromecast Antivirus Blockchain Data Loss Malware Fraud Save Time Worker Travel Audit Google Maps Comparison Adobe Law Enforcement Automation Financial Video Games Thank You Computer Forensics Solid State Drive Vulnerability Computing Infrastructure Data Protection PDF Social Media Instant Messaging Router Scalability Communications Efficiency Spam Blocking IT Support Recovery Licensing WannaCry Hardware Smart Tech Artificial Intelligence Politics Wireless Technology Mobile Innovation Update User Tips Computers Colocation Spam Virus Rootkit Wi-Fi Meetings Quick Tips Analysis Bluetooth Wireless Charging Communication Government Work/Life Balance Touchpad Files Windows 10s Cortana Employer Employee Relationship Chrome Apps Internet exploMicrosoft Bring Your Own Device Books Nanotechnology Updates Managed IT Service WIndows Server 2008 Hacking Smartphones Legislation Computer Accessories Bandwidth Office 365 Application File Storage WiFi Mobile Security Television BDR Business Owner Users Email Hosted Solution Shortcut File Sharing Internet Battery Touchscreen Cloud Security Miscellaneous Unified Threat Management Gifts Applications Big Data Business Technology Employer-Employee Relationship VPN Sports Value Business Management Training Maintenance Network Security eWaste Humor Assessment Public Computer Tech Support Wireless Flexibility Data Recovery Vendor Management Audiobook Browser Redundancy Alexa for Business HIPAA Emails Automobile Social Engineering Two-factor Authentication Ciminal Windows App store Software Office Operating System SaaS Public Cloud Webinar Physical Security Data Breach Project Management Excel Safety IT budget Unified Communications Ransomware Computer Fan Upgrades Upgrade Shadow IT Twitter Charger Hybrid Cloud Devices Connectivity Loyalty Specifications Passwords Students Computer Care Monitor Information Unsupported Software Collaboration Monitoring WPA3 Two Factor Authentication Hard Disk Drive HaaS OneNote Microsoft Gamification Language Customer Laptop Office Tips iOS Risk Management Relocation Data Storage Monitors User Error Microsoft Word Memory Consultant Evernote Tablets Streaming Media Best Practices Marketing Money Private Cloud Mobile Device Google Drive Management IT Management Phishing Data Patch Management Identity Theft Cloud Computing Internet of Things Benefits Transportation Data Backup Microsoft Excel Mobile Device Management hacker Saving Money Virtual Reality NFL Legal Outlook Device Security Phone System Google Assistant Hiring/Firing Amazon Lifestyle Cache Apple Hackers VoIP Experience Cybercrime Proactive Managing Stress Small Business Robot Gadgets IT Solutions Samsung Business Computing Facebook Identity Downtime Holiday PowerPoint End of Support FAQ Printing Search Cleaning Business Continuity Wasting Money Regulation Document Management Wireless Internet Hard Drive Budget Sales Software as a Service Content Troubleshooting Managed IT Smart Technology Company Culture Business intranet Worker Commute Managed IT Services Education The Internet of Things Cost Management Personal Information Server Best Practice Techology Professional Services Sync Screen Mirroring Virtual Assistant Tip of the Week How To How to Managed Service Provider Gmail Credit Cards CrashOverride Windows Ink Administration Augmented Reality Black Market Avoiding Downtime History Smartphone Chromebook Tech Term Workers Emergency Android Backup Edge Computing Cybersecurity Disaster Recovery App Word Microsoft Office Network Websites Productivity Networking Scam IT Support Data Theft Content Filter Firewall Entertainment Information Technology Remote Monitoring Internet Exlporer MSP Commerce Reputation Going Green Alert Remote Computing