Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Enter the Wrong Password and Have a “Theftie” Taken
Having smartphones equipped with front-facing cameras has led to the cultural phenomenon known as the selfie. For thieves that steal a smartphone and enter the wrong lock screen password, a device equipped with a “theftie” security app will take a less-than-flattering picture of the thief in action, and then upload the picture to the device’s cloud storage account or email inbox.

Depending on which theftie app you go with, some pictures will even include a map of where the picture was taken. Newer versions of iPhone come with the theftie security feature. If your smartphone doesn’t have this feature, then you can download it easily enough from any app store.

Use the Wrong Gestures and Get Locked Out
One security technique currently under development is the ability to identify unauthorized users by how they interact with the phone. Researchers at Ben-Gurion University of the Negev have successfully used the technique in trial runs to lock out unauthorized users in as little as 13.8 seconds (which isn’t enough time for a thief to access sensitive files).

The idea behind this clever security feature is that every user interacts with their own phone in a unique way. To determine if the user is authentic or not, the technique takes into consideration a variety of factors, such as the pressure, frequency, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history. Seeing how a thief would be unfamiliar with the layout of a stolen phone, they would navigate the device in ways that are uncharacteristic of the phone’s owner and subsequently be locked out. On average, researchers have found that it takes 35 touches for the feature to lock out a thief.

Remotely Wipe Your Device’s Data
This last mobile security solution should only be turned to if you’re absolutely sure that your phone is stolen. When activated, this procedure will remotely wipe all of the personal data on the device, essentially leaving it with only the data that was on the device when it was brand new.

For mobile devices connected to your company, the best way to remotely wipe a missing device is through your mobile device manager. If you don’t have this solution, or if you don’t know how to use your MDM tool to remotely wipe your device, then reach out to Voyage Technology for help. Also, depending on your phone’s service provider, you may be able to have your provider remotely wipe the stolen device by simply calling them and confirming your identity.

Considering how valuable your data is and how devastating it would be if it ended up in the wrong hands, it’s easy to see how being proactive about backing up your device’s data to the cloud will end up saving you a lot of trouble, should your device become lost or stolen. Voyage Technology can assist you with this, as well as with other security measures that will keep your data safe in a worst-case scenario. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Email Google Workplace Tips Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Training Gadgets Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Vendor Wi-Fi Windows 10 Business Technology Bandwidth Virtualization Apps Data Security Mobile Office Two-factor Authentication Managed Services Employer-Employee Relationship App BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Voice over Internet Protocol Apple Networking How To BDR Hacker HIPAA Avoiding Downtime Computing Physical Security Applications Information Technology Marketing Access Control Office 365 Conferencing Password Managed IT Services Computers Operating System Router Website Virtual Private Network Risk Management Health 2FA Help Desk Office Tips Analytics Augmented Reality Retail Storage Healthcare Big Data Bring Your Own Device Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Customer Service Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Document Management The Internet of Things Remote Workers Managed IT Service Telephone Scam Social Data loss Data Privacy Customer Relationship Management Images 101 Telephone System Multi-Factor Authentication Robot Mobility Hacking Cost Management Settings Presentation Printing Wireless Content Filtering Wireless Technology IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Word Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Safety Humor Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Alert Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Competition Business Growth Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Wearable Technology Memory Vendors Alt Codes Content Remote Working User Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Typing Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies IP Address Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Meta Managing Costs Amazon Username Recovery Point of Sale eCommerce 5G Black Friday SSID Hard Drives Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Domains Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Refrigeration Tactics Development Windows 8 Laptop Websites Mirgation Hypervisor Displays Public Speaking Drones Shopping Nanotechnology Optimization PowerPoint Lithium-ion battery Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Entrepreneur Addiction Management PCI DSS Halloween Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Undo Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Twitter Alerts SQL Server Technology Care Deep Learning Download Net Neutrality Financial Data Error History Business Communications Application Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Upload Procurement Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources IBM CES Tablet IoT Communitications Search Dark Web Cables

Blog Archive