- Lost or stolen mobile device: One of the most common breaches is often due to user error. A lost mobile phone, tablet or laptop can contain valuable information that thieves or hackers can use to their advantage. Often, the attack is more targeted. A thief will wait for the right moment to steal the phone, tablet or laptop to gain the information which can be used for monetary gain or other reasons.
If your mobile device or laptop is lost or stolen, there are several actions you need to take immediately. You should have a good plan in place just in case such an incident was to occur.
The first step is to report any loss immediately. If there is financial data stored in the phone, the financial institutions should be notified and put on alert in case of any suspicious activity.
Next, all authentication methods must be changed. Not just passwords, but security challenge questions and other information that can be used to access the accounts. Be sure to change your security questions to something that is not personal and is not even remotely related to the business of the account. Otherwise, the answer may be able to be guessed by a motivated hacker.
Extra authentication should be added where available. Two-step (also known as two-factor) authentication should be added whenever possible. This makes it harder for thieves or hackers to access your account.
- Manipulation: The loss of data is just the beginning. Once sensitive information has fallen into the wrong hands, the real crime begins. Depending on what type of information has been stolen, it may be used in a variety of ways- ransom notes, extortion, blackmail, etc. This can lead to a host of actions against an attorney that doesn't take the proper measures to protect confidential client data. All possible precautions must be taken to ensure that this does not happen. If it does, the culprits must be caught. There are apps that can track stolen mobile devices and laptops. And of course, complete cooperation with authorities that are investigating the matter will help expedite the process.
- Unauthorized access: Not all information is used for extortion or blackmail. Sometimes the competition will steal company secrets, confidential information, client lists, formulas, recipes or other information that they can use against the competition. This information can be accessed by stealing a mobile device or laptop, gaining access through a Wi-Fi connection or by using malware on a company computer or laptop to steal data.
- Lack of security: Lack of security provides easy accesses to knowledgeable hackers. Easily guessed passwords or security challenge questions can lead to unauthorized access. Using mobile devices in unsecured wireless hotspots such as restaurants or coffee shops can lead to breaches in security. Downloaded apps can contain malware or keylogging features that can steal information and pass it on to criminals.
Strong passwords, extra authentication measures, keeping passwords safe, making smart decisions and being aware of your surroundings when accessing confidential accounts- these can all help keep data safe and secure. Recovering data once a breach has happened is duly important as well.
- Revisiting cloud computing: how has it changed - and changed us? (gizmag.com)
- Information Commissioner publishes guidance on Bring Your Own Device (techblog.brodies.com)
- Apple introducing extra protection against hackers (guardian.co.uk)
- How You Are Helping Hackers Steal Your Data (hongkiat.com)
- Five security risks of moving data in BYOD era (zdnet.com)
- Subscribe to Pogoplug Family for $19.95, get a free Pogoplug (reviews.cnet.com)
- Mobile device data recoveries surge (net-security.org)
- Password denied: when will Apple get serious about security? (theverge.com)
- BYOD: Major Risk or Latest Bandwagon? (blogs.oucs.ox.ac.uk)
- Nearly One in Three Consumers Who Have Lost Their Mobile Devices Still Do Not Lock Them, New Survey Shows (darkreading.com)