Blog Layout

Lost Mobile Device: How to Emerge from Your IT Nightmare without PTSD

What’s your plan when an employee loses a mobile device with company data on it?


You’ll probably start by asking a lot of questions. When did they last use it? What locations did they visit? Of course, they don’t know. Maybe they misplaced it at the airport, left it in the Lyft car, or forgot it in the diner bathroom. That phone is gone. What do you do next?


Swift Damage Control


First things first. You have a responsibility to your clients to inform them that their information is at risk. This necessity only becomes more and more urgent based on how sensitive the material the lost device contained was. If your data stores included the right information, your employee’s poor memory could have just put those businesses at risk, whose owners would hold you responsible. It is crucial that you reach out with openness and honesty to your clients.


While this may appear to be acting hastily, haste is your friend in this situation. Regardless of what damage might occur, your clients will be less angry if you take quick and open action to protect them than if they learn you tried to cover up and hide the fact that their data is probably loose in the wild.


Depending on the industries you serve, there may be regulations explicitly requiring you to inform your clients of your mishap. Most U.S. territories have specific legislation outlining notification requirements in the event of a data breach. Go through the proper channels, and follow policies.


If the breach affects information linked to external accounts, such as bank account with credentials and other sensitive data, you will also need to notify the institution that maintains those accounts, so they can check for suspicious activity. Naturally, you should consult with law enforcement. If your local law enforcement resources are inexperienced in such matters, notify a higher law enforcement body, such as the Federal Bureau of Investigation.


Finally, are there any other parties you must inform of the data leak? This is especially critical if electronic health information is in question.


Go Into Lockdown


As you are informing your clients of your sudden data vulnerability, you will also need to batten down the hatches and reduce that vulnerability as much as possible. If you have the ability, wipe the phone remotely to minimize the damage done, and change the passwords that were associated with the device in question. It may even be a good idea to have your entire organization update their passwords, enforcing stricter requirements to promote higher security standards.


Consider taking an inventory of the devices you possess, calling them in from the field to check for other potential vulnerabilities. If you’re short more than that one compromised device, you’ve just discovered another potential data vulnerability to remedy.


Prepare For the Future


Once you have the situation acceptably under control, you will also need to take the steps to ensure that you are better prepared if your network is left with another potential access point. There are numerous solutions available to assist you in maintaining data security, as well as allowing remote work to take place without so much worry.


Mobile Device Management (MDM) is the solution that, if implemented early enough, can save you a lot of stress should one of your devices go missing in action. MDM allows you to remotely access and, if need be, wipe a mobile device to preserve your data security. You might find this discussion about adapting to and supporting a growing mobile workforce helpful.


A Virtual Private Networking (VPN) can help you add an additional level of data security to your computing and browsing. By concealing your data behind encryption, a VPN allows you to browse more securely, safe from peering eyes online.


If you’re worried about data that may be stored natively on the lost device, Centralized Cloud Storage is an especially important solution for you to implement. A cloud solution can allow you to securely store your documents on a remote server, preventing sensitive data from being hosted on the device itself. This way, an opportunistic cybercriminal would need both a company device and an authorized passcode to access your data. We’ll be discussing cloud security at our June 22 Tech Talk.


Of course, no employee will actively try to lose their mobile work device, but accidents happen. When they do, you need to be prepared to deal with the consequences.


The Walker Group created Walker911 to provide the help you need with a crisis like this. If you’re NOT in crisis mode, but you need assistance setting up a proactive plan for this kind of emergency, we’re good at that. Reach out online or call us at 800-701-7638.



written by:

Brendan Kelly

Brendan Kelly is a Business Alliance Manager focused on building partnerships with technology companies that can help The Walker Group’s clients increase efficiencies, reduce operating expenses and mitigate IT security risks. Prior to assuming the Business Alliance Manager role at Walker, Brendan spent 10+ years in new business sales and account management roles while working for both software and service providers.


More Recent News

hands typing on keyboard, overlay of security login windows, computer
January 24, 2025
In today’s digital landscape, data privacy and protection are more critical than ever. With cyber threats ever-present and on the rise, businesses and individuals alike must take proactive steps to secure sensitive information and comply with industry regulations. Whether you operate in healthcare, finance, retail, manufacturing, or any other sector handling personal data, robust privacy practices can protect your customers, enhance trust, and prevent costly breaches. Likewise, individuals must take similar precautions to safeguard their personal information from identity theft, financial fraud, and cyberattacks at home.
The Walker Group: Year in Review Newsletter  2024
December 18, 2024
As we close out another year, we’re reflecting on the incredible milestones, partnerships, and growth that defined 2024. From groundbreaking projects to community impact, our team has worked tirelessly to push boundaries and deliver exceptional results. In this issue, we’ll share highlights from the past year, celebrate our collective achievements, and look ahead to an exciting 2025. Thank you for being part of The Walker Group journey—here’s to continued success together!
November 22, 2024
Celebrating Our Spotlight in EY ’s Latest Publication We are incredibly proud to share some exciting news! Our business model and the purpose that drives us every day have been spotlighted in EY ’s latest publication, Beyond Sustainability as Usual: How Business Transformation Can Unlock the New Economy. This recognition is a meaningful opportunity to tell our story and inspire others to discover and follow their own true North Star. EY’s New Economy Unit publication dives deep into groundbreaking examples and case studies of businesses driving transformative change. It highlights organizations that embody new economy principles—those that are reimagining traditional approaches to create a better, more sustainable future. We are truly honored to be featured among such inspiring companies and to contribute to this vital conversation. Our inclusion in this publication is a testament to the power of purpose-driven business. We believe that aligning operations with a strong mission not only drives success but also creates lasting value for people, communities, and the planet. This feature is a reflection of our ongoing commitment to innovation, sustainability, and transformation. We hope this recognition serves as a spark for others to think boldly and creatively about how business can be a force for good. Together, we can unlock the full potential of the new economy and build a brighter, more sustainable future.
Share by: