List six steps an organization should follow if a mobile device is lost or stolen.

What will be an ideal response?


Generally, the organization should follow at least the following steps if a mobile device is lost or stolen:
1  Report the loss and possible data breach to the appropriate person or group in the organization.
2  Locate and attempt to recover the device if it has a functional tool enabled, such as Find My iPhone.
3  Remote wipe the device if there is a functional tool.
4  Define any encryption on the device so that any old keys, signatures, or certificates are marked as lost/stolen.
5  Disable all accounts associated with the phone (carrier, apps, sign-in, etc.).
6  Reissue new device with all apps installed and generate new keys for any encryption (for example, BitLocker).
 

Computer Science & Information Technology

You might also like to view...

Two types of audit records used are Detection-specific audit records and _________ audit records. ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When evaluating the relevance of a website, the date of publication is not important

Indicate whether the statement is true or false

Computer Science & Information Technology

The ability to snap a page to the left or right side of the screen so a second page can share the screen is a function of what feature?

A. Aero B. App multitasking C. side-by-side apps D. app tiling

Computer Science & Information Technology

_________________ enables you to use a USB flash drive or a Compact Flash or Secure Digital memory card as an additional source of memory

a. Task Manager b. Performance Monitor c. ReadyBoost d. AddMem

Computer Science & Information Technology