According to the findings of a survey by endpoint data protection security experts, Credant Technologies, 80% of phone users store information on their phones that could easily be used to steal their identities. The research surveyed 600 commuters at London railway stations about their mobile phones, typical usage and the types of sensitive information stored on them. The results were horrifying :
16% have their bank account details saved on their mobile phones
24% their pin numbers and passwords
11% keep social security and inland revenue details
10% store credit card information
Alarmingly 40% naively fail to protect their devices with a password
Further investigation reveals the information stored is not restricted to personal details as most users also use their personal devices for business use :
99% of people use their phones for some sort of business use – even though 26% have been instructed by their employer not to do so
35% receive and send business emails
77% keep business names and addresses
30% use them as a business diary
17% download corporate information, such as documents and spreadsheets
23% store customers information
When you consider that 4 out of 10 people are not password protecting their devices, it makes many millions of users seriously exposed to the trappings of mobile phone criminals and opportunists who can use this information to clone someone’s personal, or even corporate, life.
According to Paul Huntingdon – Public Sector Director at Credant Technologies and adviser to many Government departments and large corporations, “Once you have access to someone’s emails, passwords, birthdays, business diary, documents, children’s names and pets you can easily masquerade as that person, sending out emails under their name, read all their corporate data and get to see every personal detail of their life. People are ignorant to how easy a professional thief could take over their life and effectively destroy it. It is therefore imperative that all mobile phone users, even with the most basic handset, password protect and encrypt them.”
Steve Gold, Telecoms journalist and IT expert adds “People can be destroyed when their phone gets into the wrong hands – for example blackmail, abuse and threats, just by leaving it accessible without password protection. Imagine how easy it would be to assume or destroy the life of a colleague just by stealing their phone – if it was the company chairman’s.