croom new

Eclipse Integrated Systems Blog

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

This situation is far too familiar, and with the rising use of personal devices for work purposes, it has led to too many businesses becoming vulnerable to threats. Fortunately, there are steps to help mitigate the damage if your devices are ever absconded with.

1. Suspend any Financial Permissions to the Device
One of the biggest benefits of mobile and online banking and finance management is the security that financial institutions enforce before allowing access. However, many of the security measures are easily circumvented by a user and their device’s password management. If a device is stolen, there’s a good chance that the thief will still be allowed to access many online accounts and make purchases on your (or your company’s) dime if password management is activated.

If your online accounts show signs of unauthorized use, reach out to the bank or lender immediately and explain the situation. They should have a fraud department whose job it is to handle exactly this kind of circumstance, and they will most likely refund the lost money. You should still babysit your finances, however, as the bank might not initially pay attention to smaller transactions.

2. Wipe ALL Passwords
Yes, ALL passwords. Whether it was a mobile device or a laptop that was stolen from you, you need to access all accounts literally as soon as humanly possible and change every single password you have. On a second device, log into your browser and access any password manager you may be using, including the browser’s native capabilities or a utility like LastPass. This is unfortunate, but necessary: you need to systematically go through and delete every password from the password manager, uninstalling it. You also need to go to every site you have an account with and change your credentials to it. While this in undeniably a pain to deal with, it is less of a pain than a stolen account.

3. Make Sure Browser Sync is Deactivated
If you happen to use a browser like Chrome or Firefox across multiple devices, you need to disable it before you start changing your passwords and credentials. Otherwise, any of your changes will automatically transfer over to the stolen device, rendering any of your efforts to block access thus far useless. So, once you’ve wiped the password for each account you have, turn off syncing. In Chrome, you can do this by accessing Settings > Advanced sync settings > Choose what to sync. Deselect everything and set a new password to encrypt your synced data. Then you are safe to start the password resetting process.

Secondary Measures
When it comes to finding a device that has been stolen, there are a few ways to make it easier to recover afterwards.

Note Your Serial Numbers
One of the most difficult parts of recovering a stolen laptop (or other device) that the police have recovered is proving that it belongs to you. However, if you keep a record of all of your devices and their serial numbers, you will be prepared to stake a claim to your devices once they are recovered.

To find your device’s identifying information, access Control Panel > System and Security > See the name of this computer. From there, you can take a screenshot that you can keep for your records.

You can also take pictures of the device itself, recording any identifying features and the like that could help to confirm that, should the computer be stolen and recovered, it belongs to you.

Keep Your Data Backup Updated
Unfortunately, many thieves know that it just makes more sense to wipe a stolen computer as quickly as possible - it makes it that much harder to find, after all. Plus, many thieves will use a secondhand shop as an unwitting fence to get rid of the hot device. These stores also will wipe the device before selling it. While this is good for your data security, it isn’t great for your data continuity… unless you’ve taken precautions and have maintained a data backup. Having a data backup means that, even if the thief wipes your valuable data, you haven’t lost the most valuable part of the device.

If your business finds itself in one of these positions, and you need assistance with any of these steps, we can help. Reach out to Eclipse Integrated Systems today at 800-340-0505.

Bias Can Impact Your Business from Within
Business Creates Headaches
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google User Tips Hackers Malware Software Business Management Productivity Microsoft Tech Term Hosted Solutions Innovation Efficiency Computer Backup Windows 10 Browser Email Business Apps Cybersecurity Smartphones Productivity Managed IT Services Mobile Devices Internet of Things Smartphone Small Business Windows Data Backup Saving Money Data Recovery Hardware Communication Collaboration Holiday VoIP Android Virtualization Cybercrime Wireless Network Ransomware Passwords Disaster Recovery Mobile Device IT Support Workplace Tips Data Security Mobility communications Business Continuity Law Enforcement Microsoft Office Operating System Miscellaneous IT Services Cloud Computing IT Support Users Data BDR Server Quick Tips Money Update Gadgets Password Outsourced IT Phishing Wi-Fi Social Media Mobile Device Management Telephone Systems Windows 10 Office 365 Chrome Application Information Technology Vulnerability App Unsupported Software Risk Management Upgrade Best Practice Cost Management Facebook Google Drive Employer-Employee Relationship Government Social Health Two-factor Authentication Automation Shortcut Networking Information Streaming Media Alert Identity Theft Bandwidth Politics Computers User Error Managed IT Services Marketing Proactive IT Hacking Managed IT Blockchain Data Management Work/Life Balance Save Money Current Events Sports Patch Management Office tips Spam USB Managed Service Provider Artificial Intelligence Antivirus eWaste Legal Access Control Analytics Tech Support Office Medical IT WiFi Search Gmail Mobile Computing DDoS Mobile Security Storage Excel Cleaning Flexibility Samsung OneNote Transportation Devices Internet Exlporer BYOD Router The Internet of Things Managed Service Cortana Encryption Wireless Technology Business Intelligence Television History Training Connectivity Hosted Solution End of Support Battery Touchscreen Audit Compliance VPN Save Time Google Docs Private Cloud Company Culture Wireless Charging Fraud Telephony Humor Social Engineering HaaS Data Storage iPhone Managing Stress SaaS Commerce Remote Computing Meetings Computer Care Going Green Word Data Protection Automobile Applications Maintenance Personal Information Recovery Apple Remote Monitoring and Management Outlook Webinar Virus Voice over Internet Protocol Windows Ink Ciminal Avoiding Downtime Vendor Management Threat IT Management Licensing Device Security Printing Cast Sales Virtual Reality Chromecast Upgrades G Suite Wearables Entertainment Analysis Black Market Files Movies Eliminating Downtime Running Cable IT solutions Proactive SharePoint Google Maps Project Management PowerPoint Authentication Healthcare IT Solutions FAQ Distributed Denial of Service Travel Big Data Laptop Scam Nanotechnology Google Assistant GDPR Retail Education Consultant Bring Your Own Device Bluetooth Hiring/Firing iOS Identity Wireless Internet Sync Workers Windows 10s Websites Amazon Data Loss IT budget Scalability Authorization Charger PDF Worker Commute Robot Hybrid Cloud Fax Server Tablets Spyware Books Touchpad Employer Employee Relationship Root Cause Analysis Value Dark Web Conferencing Updates Experience Data storage Benefits Data Privacy Legislation Instant Messaging Trending Unified Communications Help Desk Lithium-ion battery Solid State Drive Data Theft Virtual Assistant Teamwork How To Settings Downloads WIndows Server 2008 Text Messaging Managed IT Service NFL Computer Accessories Augmented Reality Error HBO Gifts Point of Sale Administrator Electronic Medical Records Adobe Microsoft Word Phone System Smart Technology Computer Fan Hard Drive Comparison RAM Certification Hacker Hard Disk Drive Computing Plug-In Microsoft Excel Identities Trends Troubleshooting Wearable Technology Data Breach Emails Cables Edge Video Games Uninterrupted Power Supply Operating Sysytem Internet Explorer Microsoft Office 365 Credit Cards Advertising Access Safety Music WannaCry Chromebook Reporting Screen Mirroring Specifications Budget Unified Threat Management Microsoft Teams Security Cameras Keyboard App store File Sharing Language Reputation A.I. Profitability Evernote Emergency CrashOverride Monitors Worker Disaster Relocation Printers Twitter Regulation Cache Remote Monitoring

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login