Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Texas Professional IT Services LLC Blog

What to Do Before Your Phone is Stolen, and After

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Stop Financial Permissions
As you’d expect, most financial organizations have a pretty good handle on their security. The problem is that many of those security measures can be worked around within an organization’s mobile device management policy. If a device is lost or stolen, it’s fair to assume that, if they can get into it, the person in possession of the device will have access to whatever financial information that the assigned user would have.

Before you run the risk of having your accounts compromised, contact your financial institutions and explain your position. They will have fraud protection for any and all accounts, and will have a solution to your problem. You should always be mindful of your organization’s finances if there is a chance of a breach, but if you react quickly you will have a much better chance to come out of this situation unscathed.

Eliminate All User Access to Accounts
You’ll want to wipe all the passwords on the device, no matter what type of device it is. If it’s a smart watch, you’ll want to restrict access immediately. On another device, log into the password manager you use (because almost everyone does nowadays) and meticulously delete all passwords from the password manager, or uninstall it from the device if you have administrator access. You also have to be mindful of your saved browser credentials. This will take some time, but will eliminate the problems you could have if the person in possession of the device has access to the accounts on it.

Turn Off Sync
Most browsers sync information to allow users access to the same information on multiple devices. You’ll need to turn this off in order to mitigate the chances that your new passwords are synced and provide access to the new “owner” of your lost or stolen device. Once you’ve wiped your passwords, access your browser’s settings and deselect everything you can and set a new password to encrypt your synced data. You can then start to populate passwords into all relevant applications.

Proactive Security
According to Dell, the average person loses 1.24 devices each year at an average loss of $220.15. It is inevitable that one day something like this is going to befall your company, so being prepared for that eventuality is important. You’ll want to do the following:

  • File away your devices’ serial numbers - Most electronics that change hands under these circumstances cannot be recovered, but if you want to hold hope that yours is in the vast minority, you will want to have as much information as possible. Filing pictures of your device and your device’s serial numbers can be advantageous if the police (or whomever) are able to recover a lost or stolen device.
  • Keep data backed up - Since there is a pretty slim chance you can retrieve a lost or stolen machine, keeping copies of your device’s data will allow you to at least have a copy to use when you are forced to get a new device.

Texas Professional IT Services LLC has seen it all. If you would like more information about strategies to help protect your data, give us a call today at (832) 514-6260

Taking a Look Inside Android Oreo
Tip of the Week: How to Simplify Your Inventory Ma...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, March 21, 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity Microsoft Cybersecurity User Tips Tech Term Communications Communication Malware Google Smartphones Efficiency Email Managed IT Services Backup Software Data Business Hardware Outsourced IT Internet Hackers Browser Android Windows 10 Innovation Passwords Ransomware IT Services Mobile Device Business Management Collaboration Small Business Data Backup Wi-Fi Mobile Devices VoIp Internet of Things Save Money Data Recovery IT Support Managed IT Services Hosted Solutions Users Cloud Computing Social Media Smartphone Network Holiday Applications Microsoft Office Business Intelligence Apps Saving Money Workplace Tips Wireless Miscellaneous Access Control Blockchain Networking Password Word Phishing Data Breach Business Continuity Automation VoIP Data Management Analytics Employer-Employee Relationship Chrome Marketing Office Government Router Bandwidth Excel Office 365 Settings Twitter Computer Patch Management Information Virus Cortana Remote Monitoring and Management Cost Management Scam Remote Computing Vulnerability Connectivity BYOD Gadgets Law Enforcement Medical IT Computers Cybercrime How To App Data Protection Dark Web Facebook Artificial Intelligence BDR Workers Managed Service Retail Company Culture Mobile Device Management Physical Security Politics Compliance Managed IT Service Windows Paperless Office Gmail VPN Alert Virtual Assistant Tech Terms IT Support Wireless Charging G Suite Data Security Tip of the week Spam Battery Virtualization Mobility Website Reporting Cryptocurrency Information Technology Voice over IP Bring Your Own Device Eliminating Downtime Multi-Factor Security Movies Printers Personal Information Edge Phone System Data loss HIPAA SSD Specifications Staffing Email Management Server Management Printing Remote Support Server Amazon Training Sales Database News eCommerce Hybrid Cloud Wireless Internet Shortcut Dongle Unified Communications Smart Technology Analysis E-Commerce Environment Travel Telecommuting Troubleshooting Antivirus Streaming Media Hard Drive Conferencing Touchscreen Paper Security Cameras Recovery Tablet SaaS Time Management Automobile Telephone Systems IT budget Tactics Telephone System Online Shopping Cables Help Desk RAM Payment Hosted Solution Big Data e-waste Education Millennials Update Gadget Google Drive Staff Downloads File Sharing Processors Managed IT Document Management Inventory Content Filtering Microsoft Office 365 Machine Learning Ink Remote Monitoring Lead Generation Wearables Knowledge GDPR Chrome OS IT Management Maintenance Cleaning Voice over Internet Protocol Upgrade Technology Tips Microsoft Teams instant Messaging Copy disposal Live Streaming Outlook Two-factor Authentication Websites Trends Disaster Recovery User Security Spyware Mobile Security Licensing Authentication PowerPoint Biometrics Apple Plug-In Healthcare Files Storage Google Maps Remote Control Internet Explorer Botnet Certification Backup and Disaster Recovery Managing Stress Vulnerabilities Paste Laptop Value WhatsApp Telephony Profitability Safety A.I. Printer Server Business Technology HP Digital Operating System Tech Support User Tip Authorization Entertainment Telecommute Sports Access iPhone WannaCry Proactive IT Comparison Error Hiring/Firing Spam Blocking Network Attached Storage Threat Hard Drives Quick Tips WiFi Windows 7 Emergency Thank You Regulation Congratulations CrashOverride

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520