ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With These 3 Features, a Thief May Take Your Phone, But They’ll Never Take Your Data

With These 3 Features, a Thief May Take Your Phone, But They’ll Never Take Your Data

One of the biggest fears of every smartphone user is having their phone stolen. Compounding this fear is the additional risk of the thief accessing the contents of the device and doing with it as they please. To help reduce the injury that comes from the insult of a stolen phone, security developers have come up with several clever solutions.

Detection of Wrong Gestures
One promising security technique currently under development by researchers at Ben-Gurion University of the Negev can identify unauthorized users by how they interact with the phone. The idea here is that the way you use your own device is unique to you, meaning that your phone should be able to detect an unauthorized user solely based on them using gestures uncharacteristic of you. Upon making this determination, the phone will effectively lock the user out. In trial runs of this technique, it took the device a mere 13.8 seconds to lock out the unauthorized user.

A list of factors that this security technique takes into consideration are: the frequency, pressure, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history prior to the phone landing in the wrong hands. Seeing how a new user would be unfamiliar with a stolen phone’s layout and customized interface, researchers estimate that a thief won’t get more than 35 touches in before they’re locked out.

Take a Picture When a Wrong Password is Entered
Another clever security feature is an app that takes a picture with the device’s front-facing camera whenever the wrong lock screen password is entered. This measure is being compared to the other popular use of front-facing cameras known as “selfies,” and is thus given the name “thefties.”

Upon taking a photo of the would-be thief, the picture is then sent to either your cloud storage account or your email, depending on which theftie app you use. Some theftie apps will even go so far as to use the phone’s GPS feature to include a map of where the photo was snapped. Newer versions of the iPhone have this theftie feature built in, and additional theftie apps are available for download from the various app stores.

Remotely Wipe a Stolen Device
Then there’s the nuclear option. If you’re sure that your phone is stolen, and we mean absolutely sure, like, you’re 100 percent confident that it’s not hiding under the front seat of your car, then you can remotely wipe all of your device’s data. This procedure effectively makes the device like new, eliminating all of the data that was on it at the time.

It’s best practice to enable this feature using your mobile device manager. For help with this, ClearView IT can provide you with an enterprise-level mobile device management solution capable of remotely wiping an employee's stolen phone if it contains sensitive company data. Also, depending on the phone’s service provider, they may be able to remotely wipe the stolen device if you call them and confirm your identity.

As much as having your phone stolen but  it can at least be replaced. The data on your phone, however, is much more difficult to replace, or impossible if it’s not backed up to the cloud. Therefore, you’ll want to take all the security measures you can in order to ensure that your device’s personal data will forever be just that, personal.

For help implementing security features on all of your company’s mobile devices, give ClearView IT a call today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Apps IT Support Browser Windows 10 Managed Service Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Business Technology Spam Blockchain Bandwidth Server Information Encryption Mobile Device Management WiFi Remote App Virtualization Two-factor Authentication Information Technology Office 365 History Budget Gmail Apple Office Employee/Employer Relationship Health Wi-Fi Conferencing Access Control Cybercrime Analytics Data Security Big Data BDR IT Management Document Management Training Voice over Internet Protocol Employer-Employee Relationship Hacker Save Money Compliance Remote Computing Patch Management Vendor Remote Monitoring Help Desk Cost Management Hacking Legal Search... Data storage Best Practice Mobile Office Money Retail Data loss Customer Service Alert Unified Threat Management Managed Services Firewall Hiring/Firing Outlook Augmented Reality Word BYOD Password IBM Computing Website Vendor Management Applications Hard Drive Project Management Vulnerabilities Law Enforcement Healthcare Mobility Marketing End of Support Meetings Printer Running Cable Laptop Google Maps Scam Storage Remote Workers Travel Windows 7 VPN Virtual Reality Social Engineering Social Free Resource Sports SaaS DDoS Cryptocurrency Black Market Windows 11 Update User Cleaning How To iPhone Robot Education Cortana Content Filtering Data Breach Paperless Office Antivirus Chrome Maintenance Router Twitter The Internet of Things Monitoring Mobile Computing YouTube Websites Microchip Video Conferencing IT Consultant Vulnerability Flexibility Virtual Machines Wireless Technology Saving Time Software as a Service Data Protection eWaste Computer Repair Customer Relationship Management Co-Managed IT Bitcoin Professional Services Entertainment Hack Identity Theft Computers Notifications Downtime Safety Telephone Unified Communications Google Docs Virtual Desktop Bluetooth Managed Services Provider Excel Experience Distributed Denial of Service Office Tips Virtual Private Network Tech Terms Private Cloud Memory Managed IT HIPAA Digital Current Events Virtual Assistant Solutions Disaster Politics Taxes Machine Learning Settings Images 101 Integration Lithium-ion battery Display Solid State Drive Processor Physical Security Processors Employees Chromebook Drones Avoiding Downtime PowerPoint Holidays Administration Automobile Start Menu Downloads Presentation Multi-factor Authentication Computer Care Cooperation Specifications How To 2FA Service Level Agreement Uninterrupted Power Supply Computing Infrastructure Webcam Teamwork Phone System Public Speaking Management Business Mangement Data Storage Device security Hypervisor Streaming Media Microsoft Excel Medical IT In Internet of Things Be Proactive Keyboard Shopping Wireless Headphones Tablets Hacks Paperless Going Green Network Congestion Business Cards SQL Server Tech Hard Drives Google Calendar Reliable Computing Error intranet Writing PCI DSS Supercomputer Licensing Humor Wireless Workplace Strategies Bookmark Virus Computer Accessories Shortcut Gig Economy Business Communications Download Environment Internet Service Provider Piracy Motion Sickness Azure Term Heating/Cooling Windows XP Comparison Scalability Google Drive Social Networking Regulations Compliance HTML Managed IT Service Proactive IT Memes Administrator Browsers Text Messaging Nanotechnology Bring Your Own Device Human Resources Upload Corporate Profile Net Neutrality Software License Google Play Knowledge Television Social Network Telephony Financial Data Employer Employee Relationship Music IT Smart Technology Data Analysis Risk Management Screen Reader Cabling Google Apps Trends Tablet Mobile Technology G Suite Security Cameras Mouse Troubleshooting Customer Resource management VoIP Telework Devices Tracking Communitications Tip of the week Microsoft 365 Staffing Botnet Fileless Malware Smartwatch IP Address Rental Service Gamification Micrsooft Procurement Company Culture Web Server SharePoint Telephone System Flash FinTech Regulations Digital Payment CES Backup and Disaster Recovery Worker Business Growth IT Assessment Supply Chain Directions Telephone Systems Content Access Supply Chain Management Desktop Value Cyber security Business Owner Electronic Medical Records Time Management Organization Accountants Public Cloud Database Google Wallet Smart Devices Recovery Workplace Competition Banking Audit Messenger Spyware Deep Learning Remote Working Trend Micro LiFi Health IT Entrepreneur AI Equifax File Sharing Business Metrics Digital Security Cameras Tactics Hosted Solution Electronic Health Records Hard Drive Disposal Transportation Documents Scams Redundancy Application Books Username Cache Business Intelligence Wasting Time Society eCommerce Freedom of Information Modem Inbound Marketing Unified Threat Management Language Startup Workers Videos Addiction Surveillance email scam Securty Cables Navigation Printing Domains Reading Monitors Mobile Security CCTV Visible Light Communication Managing Costs Windows 8 News SSID User Tip Touchscreen Legislation Media Network Management Development Computer Malfunction Employer/Employee Relationships Electronic Payment Point of Sale Evernote Emergency Relocation Vendor Mangement Displays Advertising Virtual Machine Tech Support Optimization Fake News Shortcuts Proxy Server Work/Life Balance Reviews Emails Samsung

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?