MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

This situation is far too familiar, and with the rising use of personal devices for work purposes, it has led to too many businesses becoming vulnerable to threats. Fortunately, there are steps to help mitigate the damage if your devices are ever absconded with.

1. Suspend any Financial Permissions to the Device
One of the biggest benefits of mobile and online banking and finance management is the security that financial institutions enforce before allowing access. However, many of the security measures are easily circumvented by a user and their device’s password management. If a device is stolen, there’s a good chance that the thief will still be allowed to access many online accounts and make purchases on your (or your company’s) dime if password management is activated.

If your online accounts show signs of unauthorized use, reach out to the bank or lender immediately and explain the situation. They should have a fraud department whose job it is to handle exactly this kind of circumstance, and they will most likely refund the lost money. You should still babysit your finances, however, as the bank might not initially pay attention to smaller transactions.

2. Wipe ALL Passwords
Yes, ALL passwords. Whether it was a mobile device or a laptop that was stolen from you, you need to access all accounts literally as soon as humanly possible and change every single password you have. On a second device, log into your browser and access any password manager you may be using, including the browser’s native capabilities or a utility like LastPass. This is unfortunate, but necessary: you need to systematically go through and delete every password from the password manager, uninstalling it. You also need to go to every site you have an account with and change your credentials to it. While this in undeniably a pain to deal with, it is less of a pain than a stolen account.

3. Make Sure Browser Sync is Deactivated
If you happen to use a browser like Chrome or Firefox across multiple devices, you need to disable it before you start changing your passwords and credentials. Otherwise, any of your changes will automatically transfer over to the stolen device, rendering any of your efforts to block access thus far useless. So, once you’ve wiped the password for each account you have, turn off syncing. In Chrome, you can do this by accessing Settings > Advanced sync settings > Choose what to sync. Deselect everything and set a new password to encrypt your synced data. Then you are safe to start the password resetting process.

Secondary Measures
When it comes to finding a device that has been stolen, there are a few ways to make it easier to recover afterwards.

Note Your Serial Numbers
One of the most difficult parts of recovering a stolen laptop (or other device) that the police have recovered is proving that it belongs to you. However, if you keep a record of all of your devices and their serial numbers, you will be prepared to stake a claim to your devices once they are recovered.

To find your device’s identifying information, access Control Panel > System and Security > See the name of this computer. From there, you can take a screenshot that you can keep for your records.

You can also take pictures of the device itself, recording any identifying features and the like that could help to confirm that, should the computer be stolen and recovered, it belongs to you.

Keep Your Data Backup Updated
Unfortunately, many thieves know that it just makes more sense to wipe a stolen computer as quickly as possible - it makes it that much harder to find, after all. Plus, many thieves will use a secondhand shop as an unwitting fence to get rid of the hot device. These stores also will wipe the device before selling it. While this is good for your data security, it isn’t great for your data continuity… unless you’ve taken precautions and have maintained a data backup. Having a data backup means that, even if the thief wipes your valuable data, you haven’t lost the most valuable part of the device.

If your business finds itself in one of these positions, and you need assistance with any of these steps, we can help. Reach out to MERIT Solutions today at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Business Management Backup google Managed IT Services Computer Microsoft Disaster Recovery Outsourced IT Mobile Devices Business Continuity Business communications VoIP IT Support Windows 10 Email User Tips Hardware Cybersecurity Innovation Data Backup IT Services Efficiency Cybercrime Tech Term Small Business Mobility Apps Windows Managed IT Saving Money Server Ransomware Mobile Device Management Data Recovery Smartphone Productivity Operating System Data browser Law Enforcement Internet of Things Save Money Office 365 Android Virtualization BDR Telephone Systems Phishing Smartphones Hosted Solution Quick Tips Data Security Cloud Computing Money Passwords Password Holiday Recovery Chrome Microsoft Office Communication BYOD Automation VPN Managed Service Provider Information Technology Gadgets Wi-Fi Vulnerability Application Budget Data Management Network Data Breach upgrade Social Two-factor Authentication Wireless App Hacking Google Drive Avoiding Downtime Risk Management Alert Unsupported Software Health Collaboration Miscellaneous IT Support Facebook Government Computers Work/Life Balance Best Practice Cost Management Social Media Update Workplace Tips Firewall The Internet of Things Spam Antivirus Current Events Employer-Employee Relationship Audit Managed IT Services Social Engineering Compliance Personal Information Streaming Media Tech Support Politics Wireless Technology search Cleaning USB Save Time Telephony Data Protection User Error Identity Theft Private Cloud Office tips Applications History Artificial Intelligence Flexibility Remote Computing Gmail Shortcut Proactive IT Router IT solutions Fraud Vendor Management SaaS Humor Disaster DDoS Samsung Wireless Charging Content Filtering Excel Battery Data Storage HaaS Television OneNote Sports Project Management Apple Automobile Hacker WiFi Value Internet Exlporer Solid State Drive Going Green Data Loss Saving Time Marketing Bandwidth eWaste Office Google Docs Computer Care Phone System iPhone Management Mobile Computing Legal Transportation Blockchain Users Encryption Redundancy Robot Mobile Security Commerce Devices Big Data End of Support Google Assistant Cortana Patch Management Windows 10 Education Lifestyle Business Intelligence Reputation Computer Forensics Touchscreen Twitter Charger control Outlook Advertising How To Hard Drive Benefits Word Legislation Managed IT Service PowerPoint Edge WSJ Unified Threat Management Exchange iOS Data storage Virus Chromebook Distributed Denial of Service altivista Windows Ink Comparison Entertainment Administration Wireless Internet Chromecast Ciminal Training Upgrades Evernote SBS Electronic Medical Records Regulation Computer Fan Proactive Smart Tech compaq Google Maps Point of Sale Specifications HIPAA Screen Mirroring Colocation Gamification Company Culture Wearable Technology Consultant Networking Safety Sync Hard Drives Black Market Dark Web Websites Meetings Connectivity Files hp Smart Technology Software as a Service Sales Cast Avoid Downtime Memory Emails Administrator MSP Lithium-ion battery Workers domain Adobe Shadow IT Data Theft Settings Content Filter Document Management Retail Experience Relocation Students Access intranet Computing Updates remote Licensing WannaCry Monitoring Yahoo Conferencing HBO Video Games Unified Communications Webinar IT budget Analysis Running Cable Microsoft Word Server 2008 Mobile PDF Virtual Reality Remote Monitoring Maintenance Ali Rowghani Scam Microsoft Excel Gifts Music Financial IT solutions Trending App store Professional Services Text Messaging Financial Technology Device Security Employer Employee Relationship File Sharing Analytics IT Management Windows 10s Identities server installation dvd "cannot install required files" Keyboard Travel Instant Messaging Nanotechnology Worker Commute Printing stock Computer Accessories Storage Mobile Device Credit Cards WIndows Server 2008 Hard Disk Drive IoT Laptop Identity Uninterrupted Power Supply Tablets Managing Stress Root Cause Analysis Spyware tweet FAQ Books Scalability Language Touchpad Data Privacy calculator Hiring/Firing NFL Augmented Reality CrashOverride Emergency Cache Worker Monitors Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...