What Can You Do If Your Mobile Device Is Lost to Lower Your Risk?

Few things invoke instant panic, like a missing smartphone or laptop. These devices manage a good part of our lives through files, personal financials, apps, passwords, pictures, videos, and so much more.

It's often not the device that is the biggest concern. It's the data on the device and access the device has to cloud accounts and websites. The thought of that being in the hands of a criminal is quite scary.

There are approximately 70 million lost smartphones every year. Unfortunately, the owners only recover about 7% of them. Workplace theft is all too common. The office is where 52% of stolen devices go missing. 

And, suppose it's a work laptop or smartphone that goes missing, even worse. It can mean the company is subject to a data privacy violation. It could also suffer a ransomware attack originating from that stolen device.

The Minutes After the Loss of Your Device Are Critical

The things you do in the minutes after missing a device are critical, whether it's a personal or business device that is missing. The faster you act, the less chance there is for exposure of sensitive data.

What Types of Information Does Your Device Hold?

When criminals get their hands on a smartphone, tablet, or laptop, they have access to a treasure trove, including:

  • Documents

  • Photos & videos

  • Access to any logged-in app accounts on the device

  • Passwords stored in a browser

  • Cloud storage access through a syncing account

  • Emails

  • Text messages

  • Multi-factor authentication prompts that come via SMS

  • And more

Steps to Take Immediately After Missing Your Device

As we mentioned, time is of the essence when it comes to a lost mobile device. The faster you act, the more risk you mitigate for a personal or business information breach.

Here are steps you should take immediately after the device is missing.

Steps to Take Immediately After Missing Your Device

As we mentioned, time is of the essence when it comes to a lost mobile device. The faster you act, the more risk you mitigate for a personal or business information breach.

Here are steps you should take immediately after the device is missing.

Activate a "Lock My Device" Feature

Most mobile devices and laptops will include a "lock my device" feature. It allows for remote activation if you have enabled it. You will also need to enable "location services." While good thieves may be able to crack a passcode, turning that on can slow them down.


What about "find my device?"

There is usually also a "find my device" feature available in the same setting area. Only use this to locate your device if you feel it's misplaced but not stolen - you don't want to end up face to face with criminals!

Report the Device Missing to Your Company If It's Used for Work

If you use the device for business, notify your company immediately. It still counts even if all you do is get work email on a personal smartphone. Many companies use an endpoint device manager so the IT department can revoke access to the company network immediately. 

Quick reporting of the missing device can allow your company to act fast, often mitigating the risk of a data breach.

Log Out & Revoke Access to SaaS Tools

Most mobile devices have persistent logins to SaaS tools. SaaS stands for Software as a Service - accounts like Microsoft 365, Trello, Salesforce, etc.

Use another device to log into your account through a web application. Then go to the authorised device area of your account settings. Locate the missing device, and log it out of the service. Then, revoke access if this is an option. Disconnecting the device from your account prevents the thief from gaining access.

Log Out & Revoke Access to Cloud Storage

It's essential to include cloud storage applications when you revoke access. For example, is your missing device syncing with a cloud storage platform? If so, the criminal can exploit that connection.

They could upload a malware file that infects the entire storage system or reset your device to resell it and, in the process, delete files from cloud storage.

Active a "Wipe My Device" Feature

Hopefully, you are backing up all your devices, so you have a copy of all your files in the case of a lost device. 

Does it look like the device is not simply misplaced but rather stolen or lost for good? If so, you should use a remote "wipe my device" feature if set up, which will wipe the hard drive of data.

Need Mobile Device Security Solutions?

No matter what size company you have, mobile device management is vital. Contact us to learn more about our endpoint security solutions; GET IN TOUCH.


The article is used with permission from The Technology Press.

Previous
Previous

Get More Out of Microsoft 365 With These handy Tips.

Next
Next

Critical IT policies any size practice should implement