Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Enter the Wrong Password and Have a “Theftie” Taken
Having smartphones equipped with front-facing cameras has led to the cultural phenomenon known as the selfie. For thieves that steal a smartphone and enter the wrong lock screen password, a device equipped with a “theftie” security app will take a less-than-flattering picture of the thief in action, and then upload the picture to the device’s cloud storage account or email inbox.

Depending on which theftie app you go with, some pictures will even include a map of where the picture was taken. Newer versions of iPhone come with the theftie security feature. If your smartphone doesn’t have this feature, then you can download it easily enough from any app store.

Use the Wrong Gestures and Get Locked Out
One security technique currently under development is the ability to identify unauthorized users by how they interact with the phone. Researchers at Ben-Gurion University of the Negev have successfully used the technique in trial runs to lock out unauthorized users in as little as 13.8 seconds (which isn’t enough time for a thief to access sensitive files).

The idea behind this clever security feature is that every user interacts with their own phone in a unique way. To determine if the user is authentic or not, the technique takes into consideration a variety of factors, such as the pressure, frequency, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history. Seeing how a thief would be unfamiliar with the layout of a stolen phone, they would navigate the device in ways that are uncharacteristic of the phone’s owner and subsequently be locked out. On average, researchers have found that it takes 35 touches for the feature to lock out a thief.

Remotely Wipe Your Device’s Data
This last mobile security solution should only be turned to if you’re absolutely sure that your phone is stolen. When activated, this procedure will remotely wipe all of the personal data on the device, essentially leaving it with only the data that was on the device when it was brand new.

For mobile devices connected to your company, the best way to remotely wipe a missing device is through your mobile device manager. If you don’t have this solution, or if you don’t know how to use your MDM tool to remotely wipe your device, then reach out to Voyage Technology for help. Also, depending on your phone’s service provider, you may be able to have your provider remotely wipe the stolen device by simply calling them and confirming your identity.

Considering how valuable your data is and how devastating it would be if it ended up in the wrong hands, it’s easy to see how being proactive about backing up your device’s data to the cloud will end up saving you a lot of trouble, should your device become lost or stolen. Voyage Technology can assist you with this, as well as with other security measures that will keep your data safe in a worst-case scenario. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Email Google Computer Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Facebook Information Artificial Intelligence Miscellaneous Cloud Computing Compliance Training Covid-19 Gadgets Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Blockchain Business Technology Virtualization Bandwidth Data Security Managed Services Mobile Office Two-factor Authentication Vendor Apps App Voice over Internet Protocol BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Employer-Employee Relationship Apple Networking How To BDR Hacker Conferencing Avoiding Downtime Computing Marketing Physical Security Information Technology Access Control Office 365 HIPAA Applications Managed IT Services 2FA Help Desk Computers Operating System Healthcare Website Virtual Private Network Risk Management Health Office Tips Analytics Augmented Reality Router Big Data Retail Storage Password Bring Your Own Device Monitoring Customer Service Excel Going Green Patch Management Save Money Remote Monitoring Vulnerability Remote Workers End of Support Managed IT Service Vendor Management Telephone Cybercrime Display Cooperation Free Resource Printer Project Management Windows 7 Firewall Paperless Office Infrastructure Microsoft 365 Solutions The Internet of Things Document Management Social Scam Data loss Windows 11 Data Storage Smart Technology Supply Chain Video Conferencing Hacking Managed Services Provider Presentation Saving Time Virtual Machines Robot Professional Services Settings Wireless Technology Printing Wireless Content Filtering IT Management Downloads VPN YouTube Meetings iPhone Licensing Cryptocurrency Entertainment Word Vulnerabilities Computer Repair Data Privacy Images 101 Virtual Desktop Data storage LiFi Telephone System Multi-Factor Authentication Mobility Cost Management Safety Outlook Machine Learning Money Humor Employees Integration Maintenance Antivirus User Tip Sports Modem Mobile Security Mouse Processor Holidays Customer Relationship Management Administration Best Practice Alert Mirgation Hypervisor Displays Competition Managed IT Shopping Buisness File Sharing Nanotechnology Optimization Dark Data PowerPoint How To Language Employer/Employee Relationships Outsourcing Legal IT solutions Addiction Business Growth Management PCI DSS Notifications Chatbots Navigation Gig Economy Travel Screen Reader Distributed Denial of Service Workplace Cortana Computing Infrastructure Teamwork Hiring/Firing Techology User Google Maps Service Level Agreement Internet Service Provider Alt Codes Regulations Compliance Identity Evernote Paperless Bookmark Downtime Unified Threat Management Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care IP Address Unified Threat Management Hosted Solution Download Net Neutrality Typing Financial Data History Business Communications Browsers Smartwatch Connectivity IT Network Congestion Break Fix Scams Knowledge Azure Hybrid Work Google Drive User Error Recovery Upload Procurement Hard Drives Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Domains CES Point of Sale IoT Communitications 5G Dark Web Cables Trends Supply Chain Management Experience Google Docs Unified Communications Refrigeration Bitcoin Network Management Customer Resource management FinTech Running Cable Tech Support Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Public Speaking Google Wallet Data Analysis Star Wars IT Assessment Monitors Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Windows 8 Organization Entrepreneur Laptop Websites Social Networking Legislation Shortcuts Ransmoware Drones Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Electronic Medical Records Wearable Technology Memory Vendors SharePoint Undo Health IT Halloween Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Lenovo Directions Videos Assessment Electronic Health Records Writing Virtual Reality Wasting Time Threats Hacks Server Management Scary Stories Private Cloud Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Superfish Microchip Identity Theft Internet Exlporer Software as a Service Fun Deep Learning Username Twitter Managing Costs Amazon Application Error eCommerce Black Friday SSID Social Engineering Virtual Assistant Outsource IT IBM Education Database Surveillance Remote Computing IT Technicians Virtual Machine Environment Media Mobile Computing Proxy Server Reviews Cookies Cyber Monday Medical IT Search Hotspot Transportation Small Businesses Tablet Tactics Development

Blog Archive