Thieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.
Unfortunately, bouncing back from a stolen device isn’t as easy as just buying a new one. It’s the data stored on the device that makes it so valuable, which is why a recent survey by IDG Research shows that 50 percent of phone-theft victims would pay $500 to get their phones back, and one-third would pony up a cool one grand. If that’s not enough of an incentive for thieves to step up their game, consider how much you would pay to get back a stolen device with sensitive corporate data on it, especially if the thief was savvy enough to take full advantage of the information on the device.
And here’s the million dollar question (potentially), “What do you do next if you discover that a mobile device containing corporate data has been lost or stolen?” While there’s a nice selection of security apps and preventive solutions that will help you remotely wipe your phone and even track its location, let’s assume that you’ve lacked the foresight to install these helpful apps and the only thing keeping a thief from having their way with your data is a puny lockscreen. What then?
After you’ve panicked and ran around the office like a crazy person, stop, take a deep breath, and go into damage control mode by following these four steps:
Contact Your Device’s Service Provider
Your service provider has the ability to cut off service to the phone so that it can’t be used under your name. Depending on the make, model, and service plan, they might be able to remotely “brick” your phone, which is like a kill switch that will remotely render the device useless. Without such a kill switch, a thief will be able to swap out your SIM card so they can still use the phone, and they’ll still have access to any data actually stored on the phone’s memory.
Change Your Passwords
If a thief accesses your phone’s data, they’ll be able to view every online account connected to the device, which could potentially be dozens and dozens of accounts. Once you learn that your device has been stolen, you’re in a race with the thief to change your passwords before they can figure them out. And be sure to change the passwords to something complex so they won’t discover your passwords simply by rummaging through your phone.
Report the Incident to the Authorities
Reporting the incident to local law enforcement officials will give them a record they can use to spot trends and potentially catch the criminal. Additionally, it will give them a chance to return the phone to you, should it ever be recovered.
Contact Everybody Affected
Now comes the tough part: admitting to your staff and your clients that a device has been compromised and has put their identity at risk. In some cases, you may be legally obligated to report this incident to them, which means it’s not something that you should try to cover up in an effort to save face. In fact, if you did try to cover this up and didn’t tell clients that their identities may be at risk because of the negligence of your company, then it will come back to bite you when this information comes to light. At the end of the day, most people will appreciate being notified, and offering to pay for a year’s worth of identity theft insurance will go a long way too.
Once you’ve got the damages all sorted out, you’ll want to implement effective preventive solutions for your replacement mobile device. Regarding mobile security solutions like these, White Mountain IT Services can provide you with the enterprise-level protection you need, so you will avoid a catastrophe like this from happening again.
- Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
- The Future of IT; 2019 is The Year Your Business Hires a Man... Chances are that if you are a business owner that has been in business for a decade you’ve seen how emerging technologies have changed the face of business. Technologies like cloud computing have opened up opportunities for many businesses to get the powerful computing infrastructures they need with...
- Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
- Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
- A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
- Why (and How) SMBs Should Strategically Adopt Technology There is no question that a small business can benefit from technology, as has been proven time and time again. However, an issue can arise if a business bites off more than it can chew, so to speak, and ultimately creates a spike in costs. A responsible business owner will resist this temptation an...