Share

Nine out of ten lost cell phones are tampered with by those who find the device. This is the conclusion of the Brazilian version of the project called Honey Stick, carried out for the first time in Latin America, during the months of October and November 2013.
 
To carry out the research, 30 smartphones were “lost” in three Brazilian capitals – São Paulo, Rio de Janeiro and Brasília. The mobile devices used were modified so that the company could remotely monitor everything that people did with the devices, such as phone calls, access to applications, documents and photos, for example.
 
The Honey Stick experiment found that 90% of the lost smartphones had personal and professional data accessed by the person who found them. In only 27% of the cases, there was an attempt to return the cell phone, which does not imply the absence of previous access to data or other functions unduly.
 
The research was conducted by security researcher Scott Wright of Security Perspectives Inc. and also revealed that, once lost or stolen, there is more than a 50% chance of the equipment being attempted to breach corporate data and networks. That's why it's important to ensure the protection of information stored on mobile devices, whether personal or corporate. Mainly because even if phones are replaced, the data stored on them could be at risk.
 
The national version of Honey Stick also verified that: 
 
  • 83% devices were accessed to obtain personal information and use private applications. For business information and work applications this number drops to 53%;
  • 47% of the equipment were accessed to obtain both information – personal or professional of the individual; 
  • On average, once lost, the phone took about three hours before it was accessed for the first time.  
  • 70% showed access to private photos and 47% on social networks and passwords; 
  • 40% reported attempted access to banking services; 37% in salary sheet; and 30% in corporate emails.
 
To keep information safe on mobile devices, Symantec provides tips for safe behavior: 

1. Use the screen lock feature and set complex passwords: This is the most basic precaution and requires minimal effort on the part of the user and can be recommended by companies that encourage BYOD (Bring Your Onw Device, bring your own equipment, in Portuguese); 
 
2. Use original, updated and specially developed security software for smartphones. These tools can stop hackers and prevent cyber criminals from stealing information or spying on users of public Wi-Fi networks. In addition, this solution can often help locate a lost or stolen device or remotely lock and erase data; 
 
3. Always keep the mobile device in sight: it is important that users pay attention to the places where they leave their smartphones and, if possible, use tags or cases that can differentiate them from other similar or similar devices; 
 
4. Develop and apply strict security policies in companies: Organizations – especially those that encourage the use of personal equipment in the work environment – must design online security policies for employees and keep them always up to date. At the same time, constant employee education about it and software for managing mobile devices and mobile security can help protect corporate data; 
 
5. Take an inventory of smartphones that connect to the company's network. This is important because it is not possible to protect and manage what is not known. At the same time, it is essential to ensure the security of the information contained in the equipment, in addition to the device itself.

 
 

quick access

en_USEN