Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Enter the Wrong Password and Have a “Theftie” Taken
Having smartphones equipped with front-facing cameras has led to the cultural phenomenon known as the selfie. For thieves that steal a smartphone and enter the wrong lock screen password, a device equipped with a “theftie” security app will take a less-than-flattering picture of the thief in action, and then upload the picture to the device’s cloud storage account or email inbox.

Depending on which theftie app you go with, some pictures will even include a map of where the picture was taken. Newer versions of iPhone come with the theftie security feature. If your smartphone doesn’t have this feature, then you can download it easily enough from any app store.

Use the Wrong Gestures and Get Locked Out
One security technique currently under development is the ability to identify unauthorized users by how they interact with the phone. Researchers at Ben-Gurion University of the Negev have successfully used the technique in trial runs to lock out unauthorized users in as little as 13.8 seconds (which isn’t enough time for a thief to access sensitive files).

The idea behind this clever security feature is that every user interacts with their own phone in a unique way. To determine if the user is authentic or not, the technique takes into consideration a variety of factors, such as the pressure, frequency, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history. Seeing how a thief would be unfamiliar with the layout of a stolen phone, they would navigate the device in ways that are uncharacteristic of the phone’s owner and subsequently be locked out. On average, researchers have found that it takes 35 touches for the feature to lock out a thief.

Remotely Wipe Your Device’s Data
This last mobile security solution should only be turned to if you’re absolutely sure that your phone is stolen. When activated, this procedure will remotely wipe all of the personal data on the device, essentially leaving it with only the data that was on the device when it was brand new.

For mobile devices connected to your company, the best way to remotely wipe a missing device is through your mobile device manager. If you don’t have this solution, or if you don’t know how to use your MDM tool to remotely wipe your device, then reach out to Voyage Technology for help. Also, depending on your phone’s service provider, you may be able to have your provider remotely wipe the stolen device by simply calling them and confirming your identity.

Considering how valuable your data is and how devastating it would be if it ended up in the wrong hands, it’s easy to see how being proactive about backing up your device’s data to the cloud will end up saving you a lot of trouble, should your device become lost or stolen. Voyage Technology can assist you with this, as well as with other security measures that will keep your data safe in a worst-case scenario. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Apple App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Voice over Internet Protocol Chrome Gmail Budget Networking WiFi BDR HIPAA Physical Security Applications Computing Hacker Information Technology Access Control Avoiding Downtime Marketing Office 365 Conferencing Managed IT Services How To Big Data Router Operating System Virtual Private Network Computers Health Risk Management 2FA Help Desk Website Office Tips Analytics Retail Augmented Reality Healthcare Storage Password Bring Your Own Device Windows 7 Social Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Going Green Vendor Management Solutions Customer Service Display Cybercrime Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Managed IT Service Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Images 101 Administration Robot Mobility Telephone System Multi-Factor Authentication Cost Management IT Management Customer Relationship Management Settings VPN Employees Meetings Printing Integration Wireless Content Filtering Hacking User Tip Modem Presentation Computer Repair Mobile Security YouTube Processor Cryptocurrency Holidays Wireless Technology Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage Machine Learning Managed Services Provider LiFi Professional Services Saving Time Virtual Machines Word Outlook Maintenance Money Antivirus Humor Downloads iPhone Licensing Safety Vulnerabilities Sports Entertainment Mouse Data Privacy Star Wars IT Assessment Mobile Computing How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Search Best Practice Legislation Shortcuts Organization Travel Social Networking Application Google Maps Smart Devices Ransmoware Buisness Techology Fileless Malware Digital Security Cameras Content Remote Working IBM Legal Wearable Technology Memory Vendors IT solutions Business Growth Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Cortana Wasting Time Threats Alt Codes Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Competition Fraud Meta Downtime User Error Microchip Username Managing Costs Amazon Hosted Solution Typing Black Friday SSID Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Knowledge Network Management Google Drive Tech Support IT Technicians Virtual Machine Environment User Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses 5G Experience IP Address Google Docs Websites Mirgation Hypervisor Displays Unified Communications Bitcoin PowerPoint Running Cable Shopping Nanotechnology Optimization Addiction Google Wallet Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Chatbots Recovery Navigation Hard Drives Windows 8 Writing Distributed Denial of Service Workplace Laptop Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Domains Drones Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Refrigeration Co-managed IT Halloween Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Financial Data Lithium-ion battery Error History Business Communications Hacks Social Engineering Break Fix Scams Entrepreneur Scary Stories Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Fun Social Network Telework Cyber security Deep Learning Multi-Factor Security Tech Human Resources Undo Dark Web Cables CES Tablet IoT Communitications Trends Supply Chain Management Alert Education Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps

Blog Archive