Mobile phones, tablets, and laptops continue to provide us with the opportunity to work “on the go,” but this added convenience can also mean greater risk. These personal devices are making it easier to store and access both personal and University information, but they are also easy to steal or misplace. Do you know what to do if your device is lost or stolen?
- Secure your devices. Use a passphrase, password, or fingerprint to secure your device from casual intrusion.
- Turn on location tracking. If your device has a “Find Me” feature (such as Apple’s iCloud service to “Find My iPhone”) make sure it is enabled. Or investigate third-party software to help you recover your devices.
- Encrypt and backup information. Determine if your device encrypts your data at rest. That way if it’s stolen, you just lose the device and don’t open yourself to identity theft or a data breach. In many U.S. states, encryption removes the liability and reporting requirements that accompany a breach. If your device doesn’t use encryption by default, enable it or install encryption software. Don’t forget to backup information on all of your mobile devices too.
- Write it down! Record the manufacturer, model, and serial numbers of your mobile devices and store the info by sending yourself an email or writing a note.
- Notify providers. Keep important phone numbers such as your cell phone provider or the IT Support Center handy so you can quickly report the device as lost or stolen. In some cases the cell provider or the Support Center may be able to deactivate or secure the device for you remotely.
- File a report. If your device is stolen, file a police report immediately. If the device is owned/supplied by Drake, file a report with Drake Public Safety as well.
Check out the following links or contact me directly at email@example.com to learn more.
- Learn more about mobile device safety from the Stop.Think.Connect. campaign.
- The FCC offers a Smart Device Protection Toolkit.
- Read more about how to remotely track any lost smartphone, tablet, or PC.
—Peter Lundstedt, Director, Information Security & Compliance