Data could be obtained from stolen or lost devices and be used against your company. Any data accessible on the lost device, such as files, usernames or cached passwords could assist a malicious user to target you against your organisation.
We offer a review of any laptop of device to simulate what information could be obtained from lost devices, such as laptops, mobile phones and tablets.
Some of the checks we can conduct:
- Encryption review – can the data be read from the hard disk
- Physical review – Can the device be compromised via the USB , CDROM, Firewire or Thunderbolt connections
- Mobile or tablet device review
We can also review the deactivation process used for lost or stolen mobile phones using MDM software. We can run the lost device procedure and then inspect the mobile device to ensure the device does not contain any user information.