Contact us today!
217-428-6449

Network Solutions Unlimited Blog

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

This situation is far too familiar, and with the rising use of personal devices for work purposes, it has led to too many businesses becoming vulnerable to threats. Fortunately, there are steps to help mitigate the damage if your devices are ever absconded with.

1. Suspend any Financial Permissions to the Device
One of the biggest benefits of mobile and online banking and finance management is the security that financial institutions enforce before allowing access. However, many of the security measures are easily circumvented by a user and their device’s password management. If a device is stolen, there’s a good chance that the thief will still be allowed to access many online accounts and make purchases on your (or your company’s) dime if password management is activated.

If your online accounts show signs of unauthorized use, reach out to the bank or lender immediately and explain the situation. They should have a fraud department whose job it is to handle exactly this kind of circumstance, and they will most likely refund the lost money. You should still babysit your finances, however, as the bank might not initially pay attention to smaller transactions.

2. Wipe ALL Passwords
Yes, ALL passwords. Whether it was a mobile device or a laptop that was stolen from you, you need to access all accounts literally as soon as humanly possible and change every single password you have. On a second device, log into your browser and access any password manager you may be using, including the browser’s native capabilities or a utility like LastPass. This is unfortunate, but necessary: you need to systematically go through and delete every password from the password manager, uninstalling it. You also need to go to every site you have an account with and change your credentials to it. While this in undeniably a pain to deal with, it is less of a pain than a stolen account.

3. Make Sure Browser Sync is Deactivated
If you happen to use a browser like Chrome or Firefox across multiple devices, you need to disable it before you start changing your passwords and credentials. Otherwise, any of your changes will automatically transfer over to the stolen device, rendering any of your efforts to block access thus far useless. So, once you’ve wiped the password for each account you have, turn off syncing. In Chrome, you can do this by accessing Settings > Advanced sync settings > Choose what to sync. Deselect everything and set a new password to encrypt your synced data. Then you are safe to start the password resetting process.

Secondary Measures
When it comes to finding a device that has been stolen, there are a few ways to make it easier to recover afterwards.

Note Your Serial Numbers
One of the most difficult parts of recovering a stolen laptop (or other device) that the police have recovered is proving that it belongs to you. However, if you keep a record of all of your devices and their serial numbers, you will be prepared to stake a claim to your devices once they are recovered.

To find your device’s identifying information, access Control Panel > System and Security > See the name of this computer. From there, you can take a screenshot that you can keep for your records.

You can also take pictures of the device itself, recording any identifying features and the like that could help to confirm that, should the computer be stolen and recovered, it belongs to you.

Keep Your Data Backup Updated
Unfortunately, many thieves know that it just makes more sense to wipe a stolen computer as quickly as possible - it makes it that much harder to find, after all. Plus, many thieves will use a secondhand shop as an unwitting fence to get rid of the hot device. These stores also will wipe the device before selling it. While this is good for your data security, it isn’t great for your data continuity… unless you’ve taken precautions and have maintained a data backup. Having a data backup means that, even if the thief wipes your valuable data, you haven’t lost the most valuable part of the device.

If your business finds itself in one of these positions, and you need assistance with any of these steps, we can help. Reach out to Network Solutions Unlimited today at 217-428-6449.

Bias Can Impact Your Business from Within
Tech Term: Router
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Robot Video Games Comparison Fraud OneNote Tech Term Avoiding Downtime Managed Service Mobile Server Travel Password Solid State Drive Testing Chromebook Ciminal Wireless Internet Keyboard Productivity Computer Forensics Cost Management Emails Access Control File Storage Human Resources User Tips Managed IT Services Hosted Solutions iOS Payroll Law Enforcement Analysis Camera Marketing Microsoft Office IT Support Communication BDR Screen Mirroring Streaming Media Computers Admin Touchscreen Dark Web Shortcut Office Tips Software Training Managed IT Nanotechnology Spyware Instant Messaging Specifications Wireless Technology Privacy Private Cloud Software as a Service Phone System Employee-Employer Relationship Productivity Legal Spam Blocking Content Unified Communications Smartphones Upgrades Data Backup App Wireless eWaste Data storage Gmail Going Green Internet of Things Hackers CrashOverride Network Security Email Wi-Fi Budget Augmented Reality Chrome Internet Google Assistant Communications Business Continuity Windows 10 Charger Safety Passwords Big Data Printing Vulnerability HBO Alexa for Business Hybrid Cloud Accessory Smart Technology Workers Techology Microsoft Word Mobile Device Management Benefits Value Alert Language Experience Management Small Business Audit Mobile Device Conferencing Google Blockchain Managed IT Services intranet Paperless Office Virus Data Management Content Filtering Public Cloud Chromecast Facebook Virtualization Update The Internet of Things Edge Miscellaneous Websites Android Apple Hacking Evernote Projects Legislation Advertising Windows 10s Wireless Charging Internet Exlporer Flexibility Colocation Public Computer Mobility Users Battery Windows Ink Printers Business Management Business Technology Meetings Tablets Outlook Troubleshooting Cache Devices Data Privacy Computing Infrastructure IT Services Gamification Assessment IT Management WannaCry WPA3 Business Intelligence Monitor Storage Hardware Security Cameras Vendor Data FAQ Hiring/Firing Application PowerPoint Retail Lifestyle Managing Stress Professional Services Downtime Efficiency Browser Regulation IT Service VoIP Unified Threat Management Samsung Internet exploMicrosoft Mobile Devices hacker Data Storage Document Management Virtual Reality Bluetooth Technology Data Breach Gifts Computing Proactive IT solutions Hard Disk Drive Twitter Cloud Outsourced IT Connectivity Data Loss Cybercrime Bandwidth Books Customer Ransomware Backup Sync USB Automobile Collaboration Office 365 Transportation Company Culture Sports Computer Fan Save Money Save Time Project Management Employer-Employee Relationship Risk Management MSP How To Administration Virtual Private Network Business Owner Government Hard Drives Apps Best Practices Reputation Windows 7 Best Practice Network Tip of the Week Hyperlink Bring Your Own Device Cloud Computing Managed IT Service Google Maps Shadow IT Computer Remote Monitoring Firewall Worker IT Support iPhone Amazon Health Business Computing Electronic Medical Records Audiobook End of Support App store Content Filter History Security Settings Maintenance Tech Support Monitoring Computer Care Black Market Employer Employee Relationship Peripheral Word Utility Computing Loyalty Commerce Cleaning Applications Disaster Recovery NFL PDF Encryption Device Security Monitors SaaS Social Media Sales Windows Networking Thank You Workplace Tips Identity Theft IoT Adobe BYOD HIPAA Cybersecurity Hard Drive Saving Money IT budget Operating System Two-factor Authentication Spam Worker Commute Work/Life Balance Recovery Congratulations Cast Business Education Smartphone Financial Microsoft Scam Scalability Automation Identity Laptop Search Router Relocation Windows 10 VPN Compliance Root Cause Analysis Machine Learning Physical Security Unsupported Software Google Docs Wasting Money Redundancy Television Updates Office Patch Management Google Drive Artificial Intelligence IT Solutions Proactive IT Wasting Time Touchpad Personal Information Smart Tech Virtual Assistant File Sharing Telephone Systems Social Engineering Memory Hosted Solution Microsoft Excel Remote Workers Webinar Telephone Antivirus Quick Tips Cortana Entertainment How to Display User Error Gadgets WiFi Files Money Emergency Vendor Management Two Factor Authentication Licensing Excel Computer Accessories Innovation Co-Managed Services Students Data Security Consultant Malware HaaS Humor Keyboard Shortcuts Credit Cards Data Theft Identities WIndows Server 2008 Data Protection Managed Service Provider Politics Remote Computing Upgrade Saving Time SMB Information Technology Phishing Data Recovery Information Mobile Security Financial Technology Holiday Rootkit