What to do BEFORE you go to Starbucks

So you’re in the car on the way home from Starbucks, when you suddenly realize your laptop has gone missing. You drive back frantically hoping you can find it, only to discover it completely missing. What do you do? That depends…

 

Step One: Notify IT

 

If you’ve properly encrypted your sensitive data, reasonably locked down access to your device and shut down and logged off all key applications, you’re on the right track. But the first thing to do, whether or not you’ve taken those precautionary measures, is to notify your IT department (us) that you’ve lost your device. That will allow us to change passwords and lock access to applications and data a thief may gain access to via your unprotected laptop. If you’ve deployed Mobile Device Management, we can also remotely wipe your device to make sure no one will be able to gain access to the data stored on your computer (which is also why it’s CRITICAL to back up your important data on a daily basis!).

 

Step Two: Change Your Personal Passwords

 

Next, change ALL the passwords to every website you log in to, especially sites that contain data that if breached would represent a significant consequence. If your laptop contained medical records, financial information or other sensitive data (like social security numbers, birthdays, etc.), then you need to work with your management team to understand what you may be required to do by law to notify individuals who may be affected.

 

Step Three: Take Preventative Measures for Next Time

Quite simply, an ounce of prevention is worth a pound of cure; so make sure you’re engaging us to come up with a risk management strategy globally, not just with your mobile devices.

 

Other proactive steps include:

  1. Adding remote monitoring software on all mobile devices.
  2. Putting a pin-code lock or password requirement to access a device after 10 minutes of inactivity.
  3. Getting into the habit of logging out of websites when you’re done using them.
  4. Implementing Two Factor Authentication.
  5. Managing vulnerabilities on all systems through patch management and assessment.
  6. Creating a culture of security awareness and responsibility throughout your organization.

 

To learn more about protecting your mobile devices, get our free report, “7 Critical Security Measures Every Business Must Put in Place NOW with Mobile Computing". Download here: https://www.dpsolutions.com/mobiledevices