Home > ID Theft & the Law > Mobile Telephones and Data Theft

Mobile Telephones and Data Theft

By: Jack Claridge - Updated: 18 Oct 2012 | comments*Discuss
 
Mobile Telephones Laptop Wireless Device

Most of us now are in possession of a mobile telephone which we use for more than just making telephone calls. Although these mobile telephones were initially designed so that we could communicate with each other over large distances they have now taken on a more administrative dimension and see us using them for storing personal information as well as producing complex word processing and spreadsheet documents.

The Modern Office on the Move

Mobile technology has progressed to such an extent these days that many individuals can conduct business using their mobile telephones. In saying this of course we are excluding the making of telephone calls and are referring in no small part to the use of emails, spreadsheets, word processing documents and also the use of our telephones as dictation and camera devices.

Wi-Fi Technology

Wi-Fi (Wireless Fidelity) is one of the newest ways of using both mobile telephones and computer technology to access the Internet. The basic principle of Wi-Fi is that it can pick up the Internet in so-called 'hot spots' using a built in wireless modem. This wireless signal is relayed and used to transmit and receive data and calls in the same way as mobile telephones transmit and receive calls.

The Dangers of Data Theft

Using mobile telephones on the move - especially whilst using so-called Wi-Fi technology - can lead to a whole host of problems, the main one being the very real danger of data theft. Some mobile and wireless devices are not securely protected and as a result they are left open to hacking by individuals who scour these 'hot spots' looking for unprotected devices.

If a telephone or wireless laptop is not correctly protected then once it is 'seen' in a 'hot spot' then it can be accessed by another mobile telephone or laptop and at this point information can be downloaded or accessed whilst the individual is within that area.

Indeed many often are unaware that this is actually occurring and may never find out until such times as they find their identity is being used for purposes other than those it was originally intended or if their computers or telephones have been accessing sites that a user would not normally visit.

Protecting Your Data

One of the easiest and most common ways of securing your data on a mobile telephone or laptop - especially if they are accessing the Internet - is to encrypt your wireless connection. Most mobile telephones - Blackberry devices included - along with laptop wireless devices will allow you to provide what is known as a WPA or WEP key. These alpha-numeric and numeric strings of digits allow for encryption of any data you send or receive and also make it difficult for any would-be identity thieves to get access to your device in a 'hot spot'.

It is also worth removing any data from your mobile telephone's memory card as soon as you return home or to your office. Save this information to a desktop PC and delete it from your memory card. If you mobile telephone is lost or stolen then the memory card is one of the first places an identity thief will look in order to try and establish what they can about you.

You might also like...
Share Your Story, Join the Discussion or Seek Advice..
Why not be the first to leave a comment for discussion, ask for advice or share your story...

If you'd like to ask a question one of our experts (workload permitting) or a helpful reader hopfully can help you... We also love comments and interesting stories

Title:
(never shown)
Firstname:
(never shown)
Surname:
(never shown)
Email:
(never shown)
Nickname:
(shown)
Comment:
Validate:
Enter word:
Topics
Latest Comments
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Shree - Your Question:Hi, I have just got my NI number in a post. The letter contains my name as Mrs Bhagyavi Barthkumar Patel…
    20 February 2017
  • Shree
    Re: Your National Insurance Number
    Hi, I have just got my NI number in a post. The letter contains my name as Mrs Bhagyavi Barthkumar Patel instead of Mrs Bhagyavi…
    19 February 2017
  • Pd77
    Re: Your Driving Licence and your Passport
    My national insurance card and drivers licence have been stolen. what Risk is there if someone using them to get…
    2 February 2017
  • Yogesh Raja
    Re: Proving Your Identity
    Relying on signatures is boosting identity fraud because in the event of crime signatures do not even expose person's gender. To make…
    1 February 2017
  • JCG78
    Re: Identity Theft of the Deceased
    @Nana - come clean after his death. If you report him he will be arrested and face charges for stealing someone else's ID. What…
    27 January 2017
  • Nana
    Re: Identity Theft of the Deceased
    I have been caring for elderly uncle in his late 70s . He has been using his brother ID for many years . His brother lives…
    26 January 2017
  • Louise
    Re: Your National Insurance Number
    Hi. Can a national insurance card be used to find someone's bank details out ? I currently filled some details regarding a tax…
    11 January 2017
  • PRA
    Re: Your National Insurance Number
    My employer had a data breach of my NI number and it took them over two months to inform me of the breach. This seems too long.…
    23 December 2016
  • A.K
    Re: Your National Insurance Number
    I was waiting on a letter from HMRC - my new tax code. It always has a note of my FULL national insurance number, FULL name…
    20 December 2016
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Vhp - Your Question:My ex employer has been using my NI without me knowing and I have been paying tax every month and few weeks…
    8 December 2016
Further Reading...
Our Most Popular...
Add to my Yahoo!
Add to Google
Stumble this
Add to Twitter
Add To Facebook
RSS feed
You should seek independent professional advice before acting upon any information on the AboutIdentityTheft website. Please read our Disclaimer.