Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With These 3 Features, a Thief May Take Your Phone, But They’ll Never Take Your Data

With These 3 Features, a Thief May Take Your Phone, But They’ll Never Take Your Data

One of the biggest fears of every smartphone user is having their phone stolen. Compounding this fear is the additional risk of the thief accessing the contents of the device and doing with it as they please. To help reduce the injury that comes from the insult of a stolen phone, security developers have come up with several clever solutions.

Detection of Wrong Gestures
One promising security technique currently under development by researchers at Ben-Gurion University of the Negev can identify unauthorized users by how they interact with the phone. The idea here is that the way you use your own device is unique to you, meaning that your phone should be able to detect an unauthorized user solely based on them using gestures uncharacteristic of you. Upon making this determination, the phone will effectively lock the user out. In trial runs of this technique, it took the device a mere 13.8 seconds to lock out the unauthorized user.

A list of factors that this security technique takes into consideration are: the frequency, pressure, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history prior to the phone landing in the wrong hands. Seeing how a new user would be unfamiliar with a stolen phone’s layout and customized interface, researchers estimate that a thief won’t get more than 35 touches in before they’re locked out.

Take a Picture When a Wrong Password is Entered
Another clever security feature is an app that takes a picture with the device’s front-facing camera whenever the wrong lock screen password is entered. This measure is being compared to the other popular use of front-facing cameras known as “selfies,” and is thus given the name “thefties.”

Upon taking a photo of the would-be thief, the picture is then sent to either your cloud storage account or your email, depending on which theftie app you use. Some theftie apps will even go so far as to use the phone’s GPS feature to include a map of where the photo was snapped. Newer versions of the iPhone have this theftie feature built in, and additional theftie apps are available for download from the various app stores.

Remotely Wipe a Stolen Device
Then there’s the nuclear option. If you’re sure that your phone is stolen, and we mean absolutely sure, like, you’re 100 percent confident that it’s not hiding under the front seat of your car, then you can remotely wipe all of your device’s data. This procedure effectively makes the device like new, eliminating all of the data that was on it at the time.

It’s best practice to enable this feature using your mobile device manager. For help with this, Evolve IT can provide you with an enterprise-level mobile device management solution capable of remotely wiping an employee's stolen phone if it contains sensitive company data. Also, depending on the phone’s service provider, they may be able to remotely wipe the stolen device if you call them and confirm your identity.

As much as having your phone stolen but  it can at least be replaced. The data on your phone, however, is much more difficult to replace, or impossible if it’s not backed up to the cloud. Therefore, you’ll want to take all the security measures you can in order to ensure that your device’s personal data will forever be just that, personal.

For help implementing security features on all of your company’s mobile devices, give Evolve IT a call today at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Business Malware Software Business Computing User Tips Microsoft Upgrade Efficiency Workplace Tips Google Computer Hosted Solutions Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Microsoft Office Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Smartphones Mobile Computing Big Data communications Safety Unified Threat Management Money Mobile Device Management Network Quick Tips Managed Service Provider Outlook Firewall Content Filtering Wireless Technology Cybercrime Android Website Apple Best Practice Alert Employer-Employee Relationship Networking Two-factor Authentication Data storage History Data Windows Small Business Phishing Experience App Analytics Black Market YouTube Saving Money Processors Lithium-ion battery Office Tips LiFi intranet Staffing Downtime BYOD Passwords Streaming Media Help Desk Micrsooft Visible Light Communication Social Networking Disaster Retail Public Speaking IP Address Business Growth Virtualization Data Management Robot Advertising Recovery Government Sports Managed IT services Society Augmented Reality Google Wallet Keyboard Spam Search User Information Technology Running Cable Internet of Things Bluetooth Hard Drives Windows 8 Remote Computing Hosted Solution Shortcut Windows XP IT Services Automation DDoS Artificial Intelligence Documents Word Compliance Memory Heating/Cooling Tech Support Drones Deep Learning Social Business Management Browser BDR Printer Virtual Desktop Wireless Vendor Management Competition Unified Communications Securty Entrepreneur Encryption Presentation Document Management Domains Law Enforcement SaaS VoIP Monitors Proactive IT Cortana Hacker Network Congestion Displays Application Save Money Customer Service Music Laptop End of Support Cryptocurrency Router IBM Office 365 Google Docs Education Holiday Writing Cleaning
QR-Code