ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With These 3 Features, a Thief May Take Your Phone, But They’ll Never Take Your Data

With These 3 Features, a Thief May Take Your Phone, But They’ll Never Take Your Data

One of the biggest fears of every smartphone user is having their phone stolen. Compounding this fear is the additional risk of the thief accessing the contents of the device and doing with it as they please. To help reduce the injury that comes from the insult of a stolen phone, security developers have come up with several clever solutions.

Detection of Wrong Gestures
One promising security technique currently under development by researchers at Ben-Gurion University of the Negev can identify unauthorized users by how they interact with the phone. The idea here is that the way you use your own device is unique to you, meaning that your phone should be able to detect an unauthorized user solely based on them using gestures uncharacteristic of you. Upon making this determination, the phone will effectively lock the user out. In trial runs of this technique, it took the device a mere 13.8 seconds to lock out the unauthorized user.

A list of factors that this security technique takes into consideration are: the frequency, pressure, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history prior to the phone landing in the wrong hands. Seeing how a new user would be unfamiliar with a stolen phone’s layout and customized interface, researchers estimate that a thief won’t get more than 35 touches in before they’re locked out.

Take a Picture When a Wrong Password is Entered
Another clever security feature is an app that takes a picture with the device’s front-facing camera whenever the wrong lock screen password is entered. This measure is being compared to the other popular use of front-facing cameras known as “selfies,” and is thus given the name “thefties.”

Upon taking a photo of the would-be thief, the picture is then sent to either your cloud storage account or your email, depending on which theftie app you use. Some theftie apps will even go so far as to use the phone’s GPS feature to include a map of where the photo was snapped. Newer versions of the iPhone have this theftie feature built in, and additional theftie apps are available for download from the various app stores.

Remotely Wipe a Stolen Device
Then there’s the nuclear option. If you’re sure that your phone is stolen, and we mean absolutely sure, like, you’re 100 percent confident that it’s not hiding under the front seat of your car, then you can remotely wipe all of your device’s data. This procedure effectively makes the device like new, eliminating all of the data that was on it at the time.

It’s best practice to enable this feature using your mobile device manager. For help with this, ClearView IT can provide you with an enterprise-level mobile device management solution capable of remotely wiping an employee's stolen phone if it contains sensitive company data. Also, depending on the phone’s service provider, they may be able to remotely wipe the stolen device if you call them and confirm your identity.

As much as having your phone stolen but  it can at least be replaced. The data on your phone, however, is much more difficult to replace, or impossible if it’s not backed up to the cloud. Therefore, you’ll want to take all the security measures you can in order to ensure that your device’s personal data will forever be just that, personal.

For help implementing security features on all of your company’s mobile devices, give ClearView IT a call today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Microsoft Office Small Business Upgrade Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Apps Managed Service IT Support Windows 10 Browser Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Networking Windows Artificial Intelligence Workplace Strategy Managed IT services Gadgets Bandwidth Mobile Device Management Encryption Server App Virtualization WiFi Blockchain Spam Remote Business Technology Information History Apple Gmail Information Technology Office Two-factor Authentication Office 365 Employee/Employer Relationship Budget Cybercrime Health Access Control Data Security Analytics Big Data BDR Conferencing Wi-Fi Voice over Internet Protocol Employer-Employee Relationship Vendor Compliance Cost Management Patch Management Remote Computing Help Desk Hacking Remote Monitoring Document Management Save Money Hacker IT Management Training Firewall Best Practice BYOD Applications Mobile Office Computing Retail Augmented Reality Word Vendor Management Alert Hard Drive Vulnerabilities Managed Services IBM Hiring/Firing Website Outlook Password Legal Project Management Data loss Data storage Money Search... Customer Service Unified Threat Management Robot Storage Remote Workers VPN iPhone Windows 7 Education Cortana Free Resource Update Content Filtering Monitoring User Healthcare How To Router Twitter Paperless Office Antivirus Law Enforcement The Internet of Things End of Support YouTube Printer Maintenance Chrome Laptop Websites Mobile Computing Travel Meetings Virtual Reality Mobility Windows 11 Social Engineering Marketing Cryptocurrency Black Market Google Maps Running Cable Sports Cleaning Social Scam Data Breach SaaS DDoS Politics Machine Learning Settings Processor Disaster Solid State Drive Managed Services Provider Tech Terms Virtual Private Network Managed IT Digital Lithium-ion battery Multi-factor Authentication Chromebook Drones HIPAA Current Events Automobile Taxes Solutions Processors Saving Time How To Integration Microchip Images 101 Display Computers Flexibility Bitcoin Physical Security Telephone Hack Identity Theft Employees Avoiding Downtime Notifications Wireless Technology Excel PowerPoint Unified Communications eWaste Start Menu Computer Care Administration Holidays Downloads Google Docs Downtime Bluetooth Presentation Vulnerability Cooperation Distributed Denial of Service Specifications Safety Video Conferencing Software as a Service IT Consultant Office Tips Virtual Assistant Memory Data Protection Private Cloud Virtual Desktop Virtual Machines Customer Relationship Management Computer Repair Experience Co-Managed IT Professional Services Entertainment Internet Service Provider Health IT Azure Equifax Workplace Business Communications Staffing Corporate Profile Hard Drive Disposal Regulations Compliance IP Address Managed IT Service Knowledge Tactics Television Username Telephony Employer Employee Relationship Banking Google Wallet Memes Deep Learning Net Neutrality Startup Scams Cabling Messenger Freedom of Information Human Resources Tablet email scam G Suite Financial Data Navigation Addiction Mouse VoIP Mobile Security Tracking Business Metrics Risk Management Hosted Solution IT Recovery Competition User Tip Legislation Cables Books News Google Apps Web Server Language Troubleshooting Telework Society Evernote Network Management Entrepreneur SharePoint Microsoft 365 LiFi Digital Payment Smartwatch Communitications Documents Monitors Procurement Application Visible Light Communication Proxy Server Emails Point of Sale Worker Reading Fake News Access Computing Infrastructure FinTech Windows 8 Business Intelligence Service Level Agreement IT Assessment Management Time Management Device security Shortcuts Public Cloud CES Securty Displays Supply Chain Management Advertising Value Wireless Headphones Relocation Microsoft Excel Spyware Business Cards Work/Life Balance Business Owner Organization Domains Tech Support Tech Cyber security Audit Going Green Smart Devices Error Be Proactive File Sharing Remote Working Bookmark Redundancy Cache In Internet of Things Piracy AI Term Trend Micro Download Electronic Health Records Transportation Unified Threat Management HTML Workplace Strategies Workers Hacks Digital Security Cameras Network Congestion Writing Public Speaking Browsers Wasting Time Nanotechnology Reliable Computing Upload Modem Software License Streaming Media CCTV Inbound Marketing Google Play eCommerce Printing Surveillance Keyboard Social Network Touchscreen Videos Computer Malfunction Hard Drives Data Analysis Managing Costs Emergency Screen Reader Scalability Trends SSID Vendor Mangement Administrator Mobile Technology Text Messaging Proactive IT Security Cameras intranet Development Shortcut Customer Resource management Employer/Employee Relationships Devices Smart Technology Samsung Bring Your Own Device Electronic Payment Media Wireless Tip of the week Webcam Heating/Cooling Fileless Malware Virtual Machine Environment Uninterrupted Power Supply Gamification Business Mangement Company Culture Windows XP Reviews Music Optimization Social Networking Phone System Telephone System Teamwork Regulations Tablets 2FA Data Storage Directions Hypervisor Backup and Disaster Recovery Google Calendar Content Medical IT Botnet Desktop Supercomputer Shopping Electronic Medical Records SQL Server Virus Accountants Supply Chain Rental Service Paperless Micrsooft Motion Sickness Flash PCI DSS Licensing Database Comparison Google Drive Telephone Systems Gig Economy Business Growth Computer Accessories Humor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?