Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Enter the Wrong Password and Have a “Theftie” Taken
Having smartphones equipped with front-facing cameras has led to the cultural phenomenon known as the selfie. For thieves that steal a smartphone and enter the wrong lock screen password, a device equipped with a “theftie” security app will take a less-than-flattering picture of the thief in action, and then upload the picture to the device’s cloud storage account or email inbox.

Depending on which theftie app you go with, some pictures will even include a map of where the picture was taken. Newer versions of iPhone come with the theftie security feature. If your smartphone doesn’t have this feature, then you can download it easily enough from any app store.

Use the Wrong Gestures and Get Locked Out
One security technique currently under development is the ability to identify unauthorized users by how they interact with the phone. Researchers at Ben-Gurion University of the Negev have successfully used the technique in trial runs to lock out unauthorized users in as little as 13.8 seconds (which isn’t enough time for a thief to access sensitive files).

The idea behind this clever security feature is that every user interacts with their own phone in a unique way. To determine if the user is authentic or not, the technique takes into consideration a variety of factors, such as the pressure, frequency, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history. Seeing how a thief would be unfamiliar with the layout of a stolen phone, they would navigate the device in ways that are uncharacteristic of the phone’s owner and subsequently be locked out. On average, researchers have found that it takes 35 touches for the feature to lock out a thief.

Remotely Wipe Your Device’s Data
This last mobile security solution should only be turned to if you’re absolutely sure that your phone is stolen. When activated, this procedure will remotely wipe all of the personal data on the device, essentially leaving it with only the data that was on the device when it was brand new.

For mobile devices connected to your company, the best way to remotely wipe a missing device is through your mobile device manager. If you don’t have this solution, or if you don’t know how to use your MDM tool to remotely wipe your device, then reach out to Voyage Technology for help. Also, depending on your phone’s service provider, you may be able to have your provider remotely wipe the stolen device by simply calling them and confirming your identity.

Considering how valuable your data is and how devastating it would be if it ended up in the wrong hands, it’s easy to see how being proactive about backing up your device’s data to the cloud will end up saving you a lot of trouble, should your device become lost or stolen. Voyage Technology can assist you with this, as well as with other security measures that will keep your data safe in a worst-case scenario. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Covid-19 Gadgets Cloud Computing Training Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Mobile Office Data Security Vendor Apps Two-factor Authentication Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Conferencing Avoiding Downtime Office 365 Marketing How To BDR HIPAA Applications Computing Information Technology Hacker Access Control Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System 2FA Risk Management Virtual Private Network Help Desk Computers Health Remote Workers Telephone Document Management Firewall Cooperation Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Physical Security Customer Service Monitoring Display Printer Excel Paperless Office Infrastructure Managed IT Service Outlook Downloads Machine Learning iPhone Money Humor Word Licensing Entertainment Vulnerabilities Maintenance Data Privacy Antivirus Sports Images 101 Mouse Multi-Factor Authentication Mobility Safety Telephone System Administration Cost Management Robot Employees Integration Settings Modem Wireless Printing User Tip Processor Content Filtering Mobile Security IT Management Customer Relationship Management YouTube Meetings Holidays VPN Cryptocurrency Data Storage Hacking Smart Technology Supply Chain Presentation Video Conferencing Computer Repair Managed Services Provider Saving Time Virtual Desktop Virtual Machines Professional Services Data storage LiFi Wireless Technology Identity Evernote Paperless Windows 8 IP Address Regulations Compliance Laptop Websites Bookmark Smart Tech Memes Co-managed IT Drones SharePoint Download Net Neutrality Electronic Medical Records Alerts SQL Server Technology Care History Business Communications Financial Data Halloween Recovery Browsers Smartwatch Hard Drives Connectivity IT Writing Break Fix Scams Lenovo Domains Upload Procurement Virtual Reality Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Social Network Telework Scary Stories Private Cloud CES Identity Theft Refrigeration IoT Communitications Fun Dark Web Cables Superfish Deep Learning Public Speaking Trends Supply Chain Management Twitter Regulations Google Calendar Term Google Apps Lithium-ion battery Customer Resource management FinTech Error Data Analysis Education Star Wars IT Assessment Social Engineering Entrepreneur Microsoft Excel IT Maintenance Gamification Flexibility Remote Computing Staff Value Business Intelligence Social Networking Legislation Shortcuts Mobile Computing Organization Fileless Malware Digital Security Cameras Tablet Undo Smart Devices Search Ransmoware Best Practice Content Remote Working Alert Wearable Technology Memory Vendors Motherboard Data Breach Dark Data Comparison Google Play Be Proactive Managed IT Health IT Buisness File Sharing Legal Directions Videos IT solutions Assessment Electronic Health Records How To Permissions Workforce Business Growth Notifications Wasting Time Threats Travel Application Trend Micro Specifications Security Cameras Workplace Strategies Techology Microchip Google Maps Internet Exlporer Software as a Service Cortana Fraud Meta Alt Codes IBM Username Managing Costs Amazon Downtime Unified Threat Management eCommerce Black Friday SSID Unified Threat Management Hosted Solution Database Surveillance Virtual Assistant Outsource IT Media Typing IT Technicians Virtual Machine Environment Cookies Network Congestion Cyber Monday Medical IT Proxy Server Reviews Google Drive User Error Competition Tactics Development Knowledge Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Point of Sale Nanotechnology Optimization 5G PowerPoint Shopping Google Docs Unified Communications Addiction Experience Language Employer/Employee Relationships Outsourcing Navigation Bitcoin Network Management Management PCI DSS Running Cable Tech Support User Chatbots Gig Economy Screen Reader Monitors Distributed Denial of Service Workplace Google Wallet Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing

Blog Archive