Thieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.
Unfortunately, bouncing back from a stolen device isn’t as easy as just buying a new one. It’s the data stored on the device that makes it so valuable, which is why a recent survey by IDG Research shows that 50 percent of phone-theft victims would pay $500 to get their phones back, and one-third would pony up a cool one grand. If that’s not enough of an incentive for thieves to step up their game, consider how much you would pay to get back a stolen device with sensitive corporate data on it, especially if the thief was savvy enough to take full advantage of the information on the device.
And here’s the million dollar question (potentially), “What do you do next if you discover that a mobile device containing corporate data has been lost or stolen?” While there’s a nice selection of security apps and preventive solutions that will help you remotely wipe your phone and even track its location, let’s assume that you’ve lacked the foresight to install these helpful apps and the only thing keeping a thief from having their way with your data is a puny lockscreen. What then?
After you’ve panicked and ran around the office like a crazy person, stop, take a deep breath, and go into damage control mode by following these four steps:
Contact Your Device’s Service Provider
Your service provider has the ability to cut off service to the phone so that it can’t be used under your name. Depending on the make, model, and service plan, they might be able to remotely “brick” your phone, which is like a kill switch that will remotely render the device useless. Without such a kill switch, a thief will be able to swap out your SIM card so they can still use the phone, and they’ll still have access to any data actually stored on the phone’s memory.
Change Your Passwords
If a thief accesses your phone’s data, they’ll be able to view every online account connected to the device, which could potentially be dozens and dozens of accounts. Once you learn that your device has been stolen, you’re in a race with the thief to change your passwords before they can figure them out. And be sure to change the passwords to something complex so they won’t discover your passwords simply by rummaging through your phone.
Report the Incident to the Authorities
Reporting the incident to local law enforcement officials will give them a record they can use to spot trends and potentially catch the criminal. Additionally, it will give them a chance to return the phone to you, should it ever be recovered.
Contact Everybody Affected
Now comes the tough part: admitting to your staff and your clients that a device has been compromised and has put their identity at risk. In some cases, you may be legally obligated to report this incident to them, which means it’s not something that you should try to cover up in an effort to save face. In fact, if you did try to cover this up and didn’t tell clients that their identities may be at risk because of the negligence of your company, then it will come back to bite you when this information comes to light. At the end of the day, most people will appreciate being notified, and offering to pay for a year’s worth of identity theft insurance will go a long way too.
Once you’ve got the damages all sorted out, you’ll want to implement effective preventive solutions for your replacement mobile device. Regarding mobile security solutions like these, White Mountain IT Services can provide you with the enterprise-level protection you need, so you will avoid a catastrophe like this from happening again.
- Tip of the Week: How to Spot a Scam What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Woul...
- IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...
- Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
- Co-Managed Services Can Help Build a Better Business Let’s say that your organization has experienced considerable growth over the past couple of years. It’s not outpacing your IT infrastructure, and the cracks are starting to show in more ways than one. This makes it difficult to plan for the future, implement new IT initiatives, and react to issues ...
- Is a Better Camera a Good Reason to Buy a Smartphone? Today the smartphone camera has become one of the biggest selling points when consumers look to purchase a new phone. This is largely because it is crucial to the use of many of the applications that your average user uses the smartphone for. It just goes to show that in less than two decades how mu...
- Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...