Mobile

Lock up the stable before the horses are stolen

This sponsored post is produced by 3CX.

As smartphones continue to proliferate, so increases the number of thieves who can’t resist their lure. In some cities, such as New York, smartphone theft is rampant, to such an extent that the NYPD has teamed with Apple to help recover stolen iDevices, as explained in a recent New York Post article, “NYPD forms dedicated team to catch thieves who steal iPhones and iPads.” According to reporters Jamie Schram and Chuck Bennett, when an Apple device is stolen in New York, NYPD detectives obtain a tracking number, the International Mobile Station Equipment Identity (IMSEI), from the owner of the device or from online records. The police then send the IMSEI to Apple, so the company can help the NYPD track the device. One stolen device was tracked all the way to the Dominican Republic and recovered.

For those of you who own Android smartphones, who live outside New York, or both, take heart – the wireless industry is preparing a database of stolen devices. On 28 December 2012, Brian M. Josef of CTIA advised FCC Chairman Julius Genachowski as follows:

Using unique GSM smartphone identifying numbers, GSM providers will develop and deploy a database designed to prevent GSM smartphones reported as stolen from being activated or provided service. By October 31, 2012, U.S. GSM providers will implement this database so that stolen GSM smartphones will not work on any U.S. GSM network. In addition, U.S. providers will create a common database for LTE smartphones designed to prevent smartphones that are reported stolen by consumers from being activated or provided service on any LTE network in the U.S. and on appropriate international LTE stolen mobile smartphone databases. This database will be completed by November 30, 2013.

Even with databases and detectives, it’s still possible someone might make off with your mobile device, or you might just simply leave it on the plane, on your table at Starbucks – more than 300 mobile devices are stolen in London every day! While this is a painful nuisance for individual users, mobile enterprises risk the loss or theft of sensitive data, including customer contact and account information. 3CX Mobile Device Manager makes it so even if your employees’ devices are stolen or lost, your data is secure.

With 3CX Mobile Device Manager you can ensure all of your devices adhere to your company’s security policies. You can enforce a strong password from the online dashboard on all of your devices, including Android Phones and iPhones – with iPhones, 3CX Mobile Device Manager enables you to set minimum password length, time lapse before the iPhone auto-locks and the maximum number of failed password attempts before the iPhone wipes its data.

3CX Mobile Device Manager also enables you to remote lock your devices and, if necessary, remote wipe their data. You can change the password on any device and lock it from an online dashboard, so you can protect all of your data until the device is retrieved; even if the device isn’t connected to the Internet, you can lock it by sending an SMS to the device. If you can’t recover an employee’s device, you can use 3CX Mobile Device Manager to restore the device to its factory settings – this wipes the device entirely of data, both data stored on the device itself and on any SD or SIM cards.

Much as we’d love to, we can’t stop apple-picking, but we can protect your company’s core, its data. Find out how – sign up for a free 3CX Mobile Device Manager account today.

Sponsored posts are content that has been produced by a company, which is either paying for the post or has a business relationship with VentureBeat, and they’re always clearly marked. The content of news stories produced by our editorial team is never influenced by advertisers or sponsors in any way. For more information, contact sales@venturebeat.com.