Losing a mobile phone, tablet or laptop is something that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but the replacement costs only represents a fraction of the damage done when a device is misplaced. The cost of the data contained within every device can add up to many times more than the total value of the device itself.
Along with any data on the device you may use automatic login to your email and other online services. Each of these services is vulnerable to an attacker having possession of your device.
Saved Usernames and Passwords – Users often click on the link to save the passwords in their browser for sites they regularly visit. While this makes things simpler for the user it also makes it very easy for someone else with access to your device to login to your online accounts.
The problem can multiply where a single password or a combination of similar passwords have been used across several accounts. In these situations an attacker need only gain access to a single one and reuse the same credentials across many sites and services.
Email – Email accounts are a key target for attackers looking for access to your business and / or personal information. It is a service that we all take for granted, setting up the device and using automatic login every time afterwards.
It is a service that also unlocks a great deal more than just the email messages as with email access a malicious user can gain access to many of the most commonly used web services online. Using the “forgot my password” button on many websites triggers an email with a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords. Doing this both grants themselves access to your account and denies you access to it.
Contacts – One of the best features of SMS’s and instant messaging is that your contacts know the message is coming from you. When a message is sent from your device to someone you know it displays along with your name, details and maybe even a photograph. With contact information already programmed into a device an attacker has an opportunity to impersonate you. Using your identity, an attacker may attempt to steal yet more details about you and your contacts.
Social Media – Your social media accounts can often be the face of your brand and are a primary way to reach out and contact customers. They are also extremely vulnerable to being hijacked from a stolen device. Fraudulent social media access allows attackers to harvest both client and business data. Even without profiting directly, posting information on a social media account can cause irreversible damage to a business.
Protecting your business – Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer. Remember to always put passwords and security measures on all devices.
We can help you to stay secure and remain in control even when losing a device. Give us a call at 08 8326 4364 or firstname.lastname@example.org and let us help secure your business.