How To Safely Retire Mobile Devices

  /     /     /  
Publicated : 22/11/2024   Category : security


How To Safely Retire Mobile Devices


Once employees bring their new iPads, Androids, to work after Christmas, their older mobile devices must be decommissioned to protect company data



One company destroyed an old server it had replaced by dousing it in Thermite and setting it ablaze in the companys parking lot.
We lit it on fire and watched it [get destroyed], says Tyler Shields, who witnessed the extreme data-wiping incident at one of his former employers. Thats one effective way to do it, certainly.
But unless your companys smartphones or tablets are used by the President of the United States or contain classified or highly sensitive information, pyrotechnics arent necessary to ensure that older mobile devices dont leak data, says Shields, a senior analyst for security and risk management at Forrester Research.
Just how to properly purge employees older smartphones and tablets when they return to work after Christmas with their new devices is a major holiday headache for IT and security teams. The number of employee-owned smartphones and tablets continues to skyrocket: The devices will number more than 1 billion by 2018, according to Juniper Research.
Most people are working on their second or third generation of smartphone or tablet, so theyre going to be disposing of them [in lieu of new ones], says David Lingenfelter, information security officer at mobile device management firm Fiberlink. A majority of them keep them, and 58 percent are going to keep them inactive. Thats not bad, but that typically means theyre being passed on to their children, and they will do something with them.
Lingenfelter says a Harris survey commissioned by Fiberlink last year found that 68 percent of the workforce does not professionally wipe or destroy their devices.
[With employees bringing their smartphones and tablets into the workplace, companies need to work to limit the threat posed by mobile applications. See
5 Steps To Managing Mobile Vulnerabilities
.]
Here are some basic rules of thumb for users recycling or disposing of a smartphone or tablet:
Activate the factory wipe feature.
Before you hand down that tablet to your grade schooler, wipe it using, for example, the factory data reset function on an Android or the Reset function on an iPhone or iPad. That wipes all data and any apps you added from the device, which returns to its out-of-the-box unregistered setting.
The little things you dont necessarily think of when youre passing the device on to your children -- children like to click on things, and they may make a mistake and adjust your finances if you dont wipe the tablet, for instance, Lingenfelter says. Go back to factory defaults, so the kids can set it up [for] themselves and your personal and corporate information is gone.
Sometimes going through the wipe process twice makes sense to ensure the device is clean, he says.
Dont forget to remove the SD card.
This is a common oversight: A user wipes the phone properly, but leaves the SD card in place, which may be storing data. The factory reset doesnt touch the card, security experts say. This is an issue with many Android devices. You have to remember to take the card out, Lingenfelter says.
Some Android users configure their apps to save the SD card first, notes Forresters Shields. Pull the card and replace it with a new one. Then, A, youve got a backup copy of the data, and, B, you dont have to worry about any secure wipe technologies, he says.
And any SIM card also should be pulled out when you deactivate a phone, Lingenfelter says. A lot of SIMs can keep a copy of your contact list, he says.
School your employees on your organizations decommissioning procedures.
Even when mobile device management (MDM) technology is in place, things can go awry when mobile devices are retired. Once [the device] is disconnected from MDM, all is safe and secure is not always the case, Shields says. People may be lulled into a false sense of security. The device now yours is not always 100 percent secure.
Organizations should consider a default factory reset wipe whenever a user or his or her device leaves the organization. Then you make sure there are no fragments slipped outside the network, he says.
And be sure employees are educated on the procedures for retiring or recycling a personal mobile device. A lot of companies now implement MDM, with containerization, where all enterprise software and data stays in one section [of the device] and is not able to be contacted by personal software or leaked out by Dropbox or another app, says Lingenfelter.
Users should notify IT when they bring in their new Christmas iPads, for example. If they are going to use it for work, you have to make sure they take the proper steps, he says.
But keep in mind that even the best decommissioning practices can be bypassed by clever hacks. At the end of the day, youre never going to guarantee complete security when youre selling your phone. There are all sorts of extremely advanced attacks, Forresters Shields says. If youre paranoid about it, dont sell it. Destroy it.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ 5 ways SMBs can enhance security without increasing expenses ◂
Discovered: 26/12/2024
Category: security

▸ New Metasploit module out for IE zero-day flaw used in Labor attack. ◂
Discovered: 26/12/2024
Category: security

▸ Malware in DNS traffic? Watch for these signs. ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
How To Safely Retire Mobile Devices