Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Enter the Wrong Password and Have a “Theftie” Taken
Having smartphones equipped with front-facing cameras has led to the cultural phenomenon known as the selfie. For thieves that steal a smartphone and enter the wrong lock screen password, a device equipped with a “theftie” security app will take a less-than-flattering picture of the thief in action, and then upload the picture to the device’s cloud storage account or email inbox.

Depending on which theftie app you go with, some pictures will even include a map of where the picture was taken. Newer versions of iPhone come with the theftie security feature. If your smartphone doesn’t have this feature, then you can download it easily enough from any app store.

Use the Wrong Gestures and Get Locked Out
One security technique currently under development is the ability to identify unauthorized users by how they interact with the phone. Researchers at Ben-Gurion University of the Negev have successfully used the technique in trial runs to lock out unauthorized users in as little as 13.8 seconds (which isn’t enough time for a thief to access sensitive files).

The idea behind this clever security feature is that every user interacts with their own phone in a unique way. To determine if the user is authentic or not, the technique takes into consideration a variety of factors, such as the pressure, frequency, and speed of touch for the application used, how much electricity is used, and the previous 30 seconds of recent history. Seeing how a thief would be unfamiliar with the layout of a stolen phone, they would navigate the device in ways that are uncharacteristic of the phone’s owner and subsequently be locked out. On average, researchers have found that it takes 35 touches for the feature to lock out a thief.

Remotely Wipe Your Device’s Data
This last mobile security solution should only be turned to if you’re absolutely sure that your phone is stolen. When activated, this procedure will remotely wipe all of the personal data on the device, essentially leaving it with only the data that was on the device when it was brand new.

For mobile devices connected to your company, the best way to remotely wipe a missing device is through your mobile device manager. If you don’t have this solution, or if you don’t know how to use your MDM tool to remotely wipe your device, then reach out to Voyage Technology for help. Also, depending on your phone’s service provider, you may be able to have your provider remotely wipe the stolen device by simply calling them and confirming your identity.

Considering how valuable your data is and how devastating it would be if it ended up in the wrong hands, it’s easy to see how being proactive about backing up your device’s data to the cloud will end up saving you a lot of trouble, should your device become lost or stolen. Voyage Technology can assist you with this, as well as with other security measures that will keep your data safe in a worst-case scenario. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Bandwidth Blockchain Virtualization Business Technology Wi-Fi Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail Budget WiFi BYOD Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome HIPAA Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health 2FA Help Desk Operating System Computers Risk Management Retail Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Solutions Physical Security Social Display Printer Going Green Paperless Office Windows 11 Infrastructure Monitoring Customer Service Cybercrime Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Safety Sports Mouse IT Management Meetings Employees VPN Administration Integration User Tip Modem Processor Computer Repair Mobile Security Holidays Customer Relationship Management Settings Data Storage Printing Wireless Supply Chain Smart Technology Video Conferencing Content Filtering Managed Services Provider Machine Learning Hacking Presentation Saving Time YouTube Virtual Machines Professional Services Cryptocurrency Wireless Technology Managed IT Service Maintenance Downloads Antivirus Virtual Desktop iPhone Data storage LiFi Licensing Entertainment Word Vulnerabilities Outlook Data Privacy Money Images 101 Humor Entrepreneur Scary Stories Travel Social Networking Shortcuts Legislation Hacks Organization Digital Security Cameras Techology Fileless Malware Smart Devices Google Maps Fun Ransmoware Deep Learning Remote Working Content Vendors Wearable Technology Memory Data Breach Unified Threat Management Motherboard Be Proactive Comparison Google Play Undo Health IT Videos Unified Threat Management Directions Education Electronic Health Records Assessment Workforce Permissions Threats Wasting Time Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Mobile Computing User Error Microchip Software as a Service Internet Exlporer Search Meta Fraud Application Best Practice Username Amazon Managing Costs Buisness eCommerce Point of Sale Black Friday SSID IBM Legal IT solutions Surveillance Database Outsource IT Virtual Assistant Virtual Machine Environment Tech Support IT Technicians Media Business Growth Network Management Reviews Proxy Server Cookies Monitors Cyber Monday Medical IT Development Tactics Cortana Small Businesses Hotspot Transportation Hypervisor Displays Websites Mirgation Alt Codes Competition Shopping Downtime Optimization Nanotechnology PowerPoint SharePoint Hosted Solution Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Typing PCI DSS Management Gig Economy Lenovo Screen Reader Workplace Writing Distributed Denial of Service Google Drive User Internet Service Provider Service Level Agreement Knowledge Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Paperless Evernote Regulations Compliance Server Management Superfish Bookmark Memes Identity Theft Smart Tech 5G Co-managed IT IP Address Google Docs Unified Communications Net Neutrality Download Experience Technology Care Twitter Alerts SQL Server Running Cable History Error Business Communications Bitcoin Financial Data Google Wallet Smartwatch Browsers IT Connectivity Scams Social Engineering Break Fix Recovery Procurement Upload Hybrid Work Remote Computing Azure Laptop Cyber security Human Resources Multi-Factor Security Tech Hard Drives Windows 8 Telework Social Network Domains Drones CES Communitications Tablet IoT Cables Dark Web Supply Chain Management Trends Alert Halloween File Sharing Regulations Google Apps Dark Data Google Calendar Term Refrigeration FinTech Managed IT Customer Resource management Public Speaking Data Analysis IT Assessment Star Wars IT Maintenance How To Microsoft Excel Lithium-ion battery Flexibility Gamification Business Intelligence Notifications Staff Value

Blog Archive