Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Unfortunately, bouncing back from a stolen device isn’t as easy as just buying a new one. It’s the data stored on the device that makes it so valuable, which is why a recent survey by IDG Research shows that 50 percent of phone-theft victims would pay $500 to get their phones back, and one-third would pony up a cool one grand. If that’s not enough of an incentive for thieves to step up their game, consider how much you would pay to get back a stolen device with sensitive corporate data on it, especially if the thief was savvy enough to take full advantage of the information on the device.

And here’s the million dollar question (potentially), “What do you do next if you discover that a mobile device containing corporate data has been lost or stolen?” While there’s a nice selection of security apps and preventive solutions that will help you remotely wipe your phone and even track its location, let’s assume that you’ve lacked the foresight to install these helpful apps and the only thing keeping a thief from having their way with your data is a puny lockscreen. What then?

After you’ve panicked and ran around the office like a crazy person, stop, take a deep breath, and go into damage control mode by following these four steps:

Contact Your Device’s Service Provider
Your service provider has the ability to cut off service to the phone so that it can’t be used under your name. Depending on the make, model, and service plan, they might be able to remotely “brick” your phone, which is like a kill switch that will remotely render the device useless. Without such a kill switch, a thief will be able to swap out your SIM card so they can still use the phone, and they’ll still have access to any data actually stored on the phone’s memory.

Change Your Passwords
If a thief accesses your phone’s data, they’ll be able to view every online account connected to the device, which could potentially be dozens and dozens of accounts. Once you learn that your device has been stolen, you’re in a race with the thief to change your passwords before they can figure them out. And be sure to change the passwords to something complex so they won’t discover your passwords simply by rummaging through your phone.

Report the Incident to the Authorities
Reporting the incident to local law enforcement officials will give them a record they can use to spot trends and potentially catch the criminal. Additionally, it will give them a chance to return the phone to you, should it ever be recovered.

Contact Everybody Affected
Now comes the tough part: admitting to your staff and your clients that a device has been compromised and has put their identity at risk. In some cases, you may be legally obligated to report this incident to them, which means it’s not something that you should try to cover up in an effort to save face. In fact, if you did try to cover this up and didn’t tell clients that their identities may be at risk because of the negligence of your company, then it will come back to bite you when this information comes to light. At the end of the day, most people will appreciate being notified, and offering to pay for a year’s worth of identity theft insurance will go a long way too.

Once you’ve got the damages all sorted out, you’ll want to implement effective preventive solutions for your replacement mobile device. Regarding mobile security solutions like these, White Mountain IT Services can provide you with the enterprise-level protection you need, so you will avoid a catastrophe like this from happening again.

Related Articles

  • Tip of the Week: Awareness is Key to Mobile Device Security With more and more businesses relying on mobile devices for their business they have to be sure that the use of these devices doesn’t present security issues for the company. With all that is happening in business computing today, finding out how you can protect yourself in lieu of the prevalence sm...
  • How to Balance Your IT’s Value Against the Cost No matter how you look at it, technology is expensive. You’ll rarely look at your IT invoices without cringing a little on the inside. However, it’s important that you take a glance at these every once in a while to understand just what you’re getting from your technology budget. Ultimately, you wan...
  • Would You Fall for this Adult Scam if You Saw an Old Passwor... As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them. To preface this scam, we need...
  • 4 Internal Threats Every Business Owner Should Understand In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their comp...
  • Spend More Time Managing Your Business, and Less Managing Ve... Chances are, you most likely view your vendors as a necessary evil. While you have to work with them to get the things that your business needs to function, it’s hard to not think of everything else that could be accomplished in the time you spend dealing with them. Unfortunately, there are even mor...
  • Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions