Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

This situation is far too familiar, and with the rising use of personal devices for work purposes, it has led to too many businesses becoming vulnerable to threats. Fortunately, there are steps to help mitigate the damage if your devices are ever absconded with.

1. Suspend any Financial Permissions to the Device
One of the biggest benefits of mobile and online banking and finance management is the security that financial institutions enforce before allowing access. However, many of the security measures are easily circumvented by a user and their device’s password management. If a device is stolen, there’s a good chance that the thief will still be allowed to access many online accounts and make purchases on your (or your company’s) dime if password management is activated.

If your online accounts show signs of unauthorized use, reach out to the bank or lender immediately and explain the situation. They should have a fraud department whose job it is to handle exactly this kind of circumstance, and they will most likely refund the lost money. You should still babysit your finances, however, as the bank might not initially pay attention to smaller transactions.

2. Wipe ALL Passwords
Yes, ALL passwords. Whether it was a mobile device or a laptop that was stolen from you, you need to access all accounts literally as soon as humanly possible and change every single password you have. On a second device, log into your browser and access any password manager you may be using, including the browser’s native capabilities or a utility like LastPass. This is unfortunate, but necessary: you need to systematically go through and delete every password from the password manager, uninstalling it. You also need to go to every site you have an account with and change your credentials to it. While this in undeniably a pain to deal with, it is less of a pain than a stolen account.

3. Make Sure Browser Sync is Deactivated
If you happen to use a browser like Chrome or Firefox across multiple devices, you need to disable it before you start changing your passwords and credentials. Otherwise, any of your changes will automatically transfer over to the stolen device, rendering any of your efforts to block access thus far useless. So, once you’ve wiped the password for each account you have, turn off syncing. In Chrome, you can do this by accessing Settings > Advanced sync settings > Choose what to sync. Deselect everything and set a new password to encrypt your synced data. Then you are safe to start the password resetting process.

Secondary Measures
When it comes to finding a device that has been stolen, there are a few ways to make it easier to recover afterwards.

Note Your Serial Numbers
One of the most difficult parts of recovering a stolen laptop (or other device) that the police have recovered is proving that it belongs to you. However, if you keep a record of all of your devices and their serial numbers, you will be prepared to stake a claim to your devices once they are recovered.

To find your device’s identifying information, access Control Panel > System and Security > See the name of this computer. From there, you can take a screenshot that you can keep for your records.

You can also take pictures of the device itself, recording any identifying features and the like that could help to confirm that, should the computer be stolen and recovered, it belongs to you.

Keep Your Data Backup Updated
Unfortunately, many thieves know that it just makes more sense to wipe a stolen computer as quickly as possible - it makes it that much harder to find, after all. Plus, many thieves will use a secondhand shop as an unwitting fence to get rid of the hot device. These stores also will wipe the device before selling it. While this is good for your data security, it isn’t great for your data continuity… unless you’ve taken precautions and have maintained a data backup. Having a data backup means that, even if the thief wipes your valuable data, you haven’t lost the most valuable part of the device.

If your business finds itself in one of these positions, and you need assistance with any of these steps, we can help. Reach out to FRS Pros today at 561-795-2000.

Bias Can Impact Your Business from Within
Tech Term: Router
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Business Management Cloud User Tips Google Tech Term Hardware Software Hackers Data Backup Microsoft Computer Mobile Devices Malware Browser Productivity Efficiency Hosted Solutions Smartphone Cybersecurity Windows Windows 10 IT Services Data Recovery Data Security Android Office 365 Data Apps Email Smartphones Internet of Things Outsourced IT Innovation Cybercrime Business Continuity Upgrade Operating System VoIP IT Support Backup Communications Saving Money Mobile Device Management Business Money Vulnerability Alert Disaster Recovery Law Enforcement Phishing Ransomware Microsoft Office Chrome Spam Managed IT Services Server Collaboration Network Passwords IT Support Workplace Tips Best Practice Employer-Employee Relationship Small Business Applications Windows 10 Unsupported Software Google Drive Networking App Computers Holiday Cloud Computing Virtualization Information Artificial Intelligence Information Technology Telephone Systems Miscellaneous Tech Support Gadgets OneNote Blockchain Two-factor Authentication Users Managed Service Provider Managed IT Router Managed IT Services Hosted Solution Encryption Augmented Reality Gmail Commerce Save Money Avoiding Downtime Mobility Cortana Safety WannaCry Word Risk Management Budget Managed Service Communication Access Control SaaS Wireless Technology Google Docs Project Management Proactive IT Patch Management Wireless Charging Devices Mobile Security Government Data Management Bring Your Own Device Wi-Fi Touchscreen Data Storage WiFi Productivity Update Google Assistant Robot Data Breach Politics Shortcut Mobile Device Sports Travel The Internet of Things Social Media BDR Audit VPN iPhone Excel Password Fraud Data Protection Automation Business Technology Facebook Evernote Cost Management User Error Hacking Quick Tips Application NFL eWaste Antivirus Marketing BYOD Testing Wireless Retail Websites Memory Human Resources Settings Bandwidth Identities Computer Forensics Peripheral Search Files Alexa for Business Laptop Data Loss Ciminal DDoS IT Solutions Chromebook Co-Managed Services Transportation Charger Device Security Webinar Recovery Camera Private Cloud Conferencing Data Theft Hacker Disaster Financial Payroll Adobe Workers Consultant Legislation Language Emergency Management Remote Monitoring Touchpad Printing Telephone Going Green Social Point of Sale Windows Ink IT solutions Administrator Projects Gifts Computing Security Cameras Licensing Updates Identity Theft Streaming Media Vendor Comparison Lithium-ion battery PowerPoint Admin Humor Microsoft Excel IT budget iOS WIndows Server 2008 Hyperlink Outlook Machine Learning Google Maps Spyware Windows 10s HBO Access Identity Credit Cards App store Hybrid Cloud Microsoft Word Vendor Management Screen Mirroring Chromecast Employee-Employer Relationship Personal Information Specifications Virus Computer Care Nanotechnology Wireless Internet Saving Time Scam Unified Threat Management File Sharing Telephony Value Wasting Time Amazon Apple Solid State Drive Internet Exlporer Data Privacy Windows 7 Reputation Meetings Tablets Maintenance Samsung Emails Cast History Sales Proactive Root Cause Analysis Gamification Keyboard Shortcuts Data storage Upgrades Software as a Service Storage Social Engineering Computer Fan Uninterrupted Power Supply Accessory Remote Computing Health Sync Virtual Assistant Edge Legal Hard Disk Drive IT Management Hard Drive Display FAQ Save Time Computer Accessories Cache Office tips Flexibility Music Battery Smart Technology Advertising Instant Messaging Training Monitors Scalability Analytics Entertainment Keyboard Television CrashOverride HaaS Black Market Cleaning Company Culture End of Support Automobile Office Compliance Big Data Thank You Relocation Printers Managing Stress USB Worker Regulation How To Books Congratulations es Downtime PDF Video Games Experience Education Hiring/Firing Work/Life Balance Mobile Computing Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Twitter Text Messaging Phone System Benefits