Thousands of Mobile Devices Left at Airports

  Posted by in Quick Tips Wednesday, 16 March 2011 12:36

 

Training Corner: A special thank you to Discovery Training Center for submitting an article each quarter to be included in our newsletter. Please contact Discovery Training Center for all of your training needs.

According to telephone interviews with the lost property offices of 15 airports, including Heathrow and Luton, thousands of mobile phones and laptops have been left behind last year, with the majority still unclaimed and many left over the Christmas holiday peak season. This figure is likely to be just the tip of the iceberg as it does not take into account all those devices that were stolen, or kept by the ‘lucky’ finder.


The survey, carried out by Credant Technologies, also found that in the majority of cases, those devices that aren’t reclaimed are then either sold at auction or donated to charities. However the fact is that these devices may still contain information that could be available for the new owner! With ID theft from mobile phones and other lost devices at an all-time high, users should really take special care when travelling.

 

According to a representative at Luton Airport, the most common place devices are forgotten is at the security check point as it’s a very pressured environment with numerous distractions. Often, once the travelers have boarded the plane and left the country it’s just too expensive to return for the device, which in most instances will be covered by insurance, resulting in the majority going unclaimed.

 

But the device’s value is the last thing organizations should be worrying about, explains Seán Glynn, VP at Credant Technologies, “What is much more concerning are the copious volumes of sensitive data these devices contain – often unsecured and easily accessed. Without protecting mobile phones, laptops and even USBs with something even as basic as a password, a malicious third party can have easy access to the corporate network, email accounts and all the files stored on the device including the contact lists. Users also store such things as passwords, bank details and other personal information on the device making it child’s play to impersonate the user and steal their identity – both personal and corporate.”

 

Seven Top Tips To Secure Travel

1. As you leave - whether it’s the check-in desk, security check point, or even the train station, make sure you take everything with you, including your mobile devices. A few seconds to check could potentially save you hours of frustration and embarrassment.

2. Protect your mobile device: with at least a password (and ensure that it is a strong one, containing letters, numbers and symbols). Better still, use an encryption solution so that even if your device is left behind, the data on it is not accessible to anyone who finds it.

3. Don’t elect to automatically complete online credentials, such as corporate network log in details, so that if you and your device should become separated, it cannot operate without you.

4. Back-up your device and remove any sensitive information that you do not need. If it’s not there it can’t be breached.

5. As in tip 4, remove SMS and emails that you don’t need anymore - you’d be sur¬prised how many people keep their default password emails on their mobiles and other hugely sensitive information like PINs, bank account details or pass¬words!

6. Don't leave your mobile device open to access (e.g. leaving Bluetooth or WiFi turned on) somewhere visible and unsecured.

7. Include your name and contact details in the device so that, if it should be lost, it can easily be returned to you. Some operators have a registration service to facilitate this.

Finally, speak to your IT department before you leave the office this year – that’s what they’re there for. They’ll help make sure your device is better protected should it find itself languishing all alone at the airport.
http://www.discoverytrainingcenter.com/content/article-thousands-mobile-devices-left-airports

Categories

Archive

Tags

3d tv 360 kinect adzzoo aeropeek airlines Amazon Cloud Player american flag antispam antivirus apple pie applie ipad apps ascii audit audit,business audits audit report automatic updates avg avg updates back to school backup beef and cabbage beethoven Breach bunny cake business continuity business email business IT costs business recovery BYOD cable Cell Phones CES change background change mnagement charleston regional business journal check boxes window 7 christmas scams cloud cloud computing company network computer and network spending computer backup computer back up computer care computer checkup computer cleaning computer clean up computer injuries Consulting conversation view CourageousKidz cupcake kabobs customize ribbons cyber bullying Cyber security Daniel Lightner data backup data back up data recovery data storage defrag defragment dektop virtualization Depog desktop desktop virtualization digital pack rat Disaster Recovery disaster recovery plan Discovery Training Center disk clean up disk defrag disk defragment display flag properly documentation double your windows droid incredible easter cake ebook electric eye email email cleanup email etiquette email policy email scams email schemes email solutions email to cell phone encryption excel Facebook Facebook app father's day gift guide FBI Warnings fcc femtocell first jukebox flag day fourth of july ghost cookies gmail Google Music googletv green computing Green IT groupme Hacking halloween halloween fun facts halloween recipes hardware cleaning HIPAA home user hosted exchange HP Touchpad Hugo hulu Human Resources Hurricane iCloud Impersonation improve cell phone signal inbox inbox organization Integration Internet internet safety internet search internet shortcuts internet speed test iPad ipad2 iphone ipod touch Irene IT budget IT Consulting IT costs IT Custom Solutions IT Finance IT Logistics IT Myths IT Operations IT Provider it support iTunes itv junk email keyboard shortcuts kik, path kindle kinect Kotori Technologies KREG laptop lawn care tips learn to type length of cd's light bulbs MAC Managed Service managed services Manufacturing march recipes mascot microsoft xbox Mobile Devices Monitoring mortratious mother's day mummies in a blanket music name game national broadband plan neadom tucker netbook net nanny network audit network monitoring Network Security Issues network support nintendo wii no cable or satellite NonProfit notebooks Nubio office 2010 online gaming online safety online shopping safety optix email optix mail security organize gift giving our it outlook organization outlook tips pandigital novel passwords peanut butter eggs peer to peer Phone Systems pin to taskbar pin up folders Playstation power breakfast Preparedness Presidential facts Presidents Day printers printer security Privacy problem steps recorder product reviews pumpkin stew quick steps rainbow cupcakes Ransomware recent documents recipes red white and blue jello pie remove programs Risks, riso noodle house safe data save information save money saving money scam scandisk schedule security, server cleaning shopkick shortcuts side by side skype outage slow computers small business success summit smart phones social networking social networks in outlook Sony sony ereader sony playstation move spider cookies spring cleaning sunbelt vipre symbols tablet taskbar tips task bar tips technology the daily this week in tech tips turkey tetrazinni type faster typing typing characters uncle sam cupcakes uninstall programs updates vendor management virtual hosted exchange Virtual Infrastructure virus VoIP web page shortcuts website website audit website help,website wifi in your car windows 7 windows 7 tips windows calculator windows update wireless wireless security Workforce Management xbox xbox live Yamodo zip file