Chapter 11
Protecting Against Loss and Theft
In This Chapter
Protecting personal and corporate data on smartphones
Remotely locking or wiping a smartphone if it’s lost or stolen
Remotely setting off an alarm on a smartphone or locating it via GPS
Detecting changes to the SIM card
Developing an enterprise-wide loss and theft action plan
Identity thieves look for easy pickings on smartphones — devices that can be unlocked without a password or apps that have stored passwords. These types of weaknesses can let a thief access critical information easily on a device and steal personal and corporate contacts, data, and other information without breaking a sweat.
This chapter covers the services available to protect users’ personal and corporate data from thieves. If a user’s phone has been lost or stolen, she can take actions to prevent a thief from stealing the data on that phone. For example, she can first try to find the phone using GPS. If she’s unable to locate it using GPS, she can ...