Five Defensive Actions to Take Before Your Mobile Device Is Stolen - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Defensive Actions to Take Before Your Mobile Device Is Stolen-2 Next

Most of the anxiety associated with misplaced or stolen mobile devices will not exist if we would just set a device password. (You will still feel terrible about losing your phone though.) Remember to configure the device password to automatically kick in after a specified period of inactivity. For an additional level of security, opt to "Erase Data" after a certain number of failed attempts; it's optional on the iPhone and configurable between 1 to 10 wrong attempts on the BlackBerry.

Be sure to leave a message on the lock page on an alternative means to contact you, too. Paul once picked up a locked mobile phone without any accessible information on how he could return it. Though this is not possible on a non-jailbroken iPhone, one way around this limitation is to take a photo of your message and configure it as your lock screen image.

The use of smartphones has skyrocketed in recent years, and is now a repository for the vast amount of personal and work data that mobile-empowered workers are able to bring everywhere. Given its widespread use and portability, however, it is inevitable that many mobile devices will get misplaced or stolen.

With this in mind, what are some preemptive steps that businesses can take to protect the sensitive data on these devices before disaster strikes? The following are five preemptive steps Paul Mah has identified for mobile workers to take before their device is stolen.

More Slideshows:


Top 10 Travel Gadgets for 2012 The best new travel gadgets emerging in 2012.

Five Ways Businesses Can Innovate Like the Big Guys A growing number of SMBs are turning to open innovation and crowdsourcing as a way of leveling the playing field with large, global corporations.

Ten Reasons to Go with a Private Cloud Reasons why private cloud represents a better solution to real-world enterprise.

 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.