Chapter 11

Protecting Against Loss and Theft

In This Chapter

arrow Protecting personal and corporate data on smartphones

arrow Remotely locking or wiping a smartphone if it’s lost or stolen

arrow Remotely setting off an alarm on a smartphone or locating it via GPS

arrow Detecting changes to the SIM card

arrow Developing an enterprise-wide loss and theft action plan

Identity thieves look for easy pickings on smartphones — devices that can be unlocked without a password or apps that have stored passwords. These types of weaknesses can let a thief access critical information easily on a device and steal personal and corporate contacts, data, and other information without breaking a sweat.

This chapter covers the services available to protect users’ personal and corporate data from thieves. If a user’s phone has been lost or stolen, she can take actions to prevent a thief from stealing the data on that phone. For example, she can first try to find the phone using GPS. If she’s unable to locate it using GPS, she can ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.