Home > ID Theft & the Law > Mobile Telephones and Data Theft

Mobile Telephones and Data Theft

By: Jack Claridge - Updated: 18 Oct 2012 | comments*Discuss
 
Mobile Telephones Laptop Wireless Device

Most of us now are in possession of a mobile telephone which we use for more than just making telephone calls. Although these mobile telephones were initially designed so that we could communicate with each other over large distances they have now taken on a more administrative dimension and see us using them for storing personal information as well as producing complex word processing and spreadsheet documents.

The Modern Office on the Move

Mobile technology has progressed to such an extent these days that many individuals can conduct business using their mobile telephones. In saying this of course we are excluding the making of telephone calls and are referring in no small part to the use of emails, spreadsheets, word processing documents and also the use of our telephones as dictation and camera devices.

Wi-Fi Technology

Wi-Fi (Wireless Fidelity) is one of the newest ways of using both mobile telephones and computer technology to access the Internet. The basic principle of Wi-Fi is that it can pick up the Internet in so-called 'hot spots' using a built in wireless modem. This wireless signal is relayed and used to transmit and receive data and calls in the same way as mobile telephones transmit and receive calls.

The Dangers of Data Theft

Using mobile telephones on the move - especially whilst using so-called Wi-Fi technology - can lead to a whole host of problems, the main one being the very real danger of data theft. Some mobile and wireless devices are not securely protected and as a result they are left open to hacking by individuals who scour these 'hot spots' looking for unprotected devices.

If a telephone or wireless laptop is not correctly protected then once it is 'seen' in a 'hot spot' then it can be accessed by another mobile telephone or laptop and at this point information can be downloaded or accessed whilst the individual is within that area.

Indeed many often are unaware that this is actually occurring and may never find out until such times as they find their identity is being used for purposes other than those it was originally intended or if their computers or telephones have been accessing sites that a user would not normally visit.

Protecting Your Data

One of the easiest and most common ways of securing your data on a mobile telephone or laptop - especially if they are accessing the Internet - is to encrypt your wireless connection. Most mobile telephones - Blackberry devices included - along with laptop wireless devices will allow you to provide what is known as a WPA or WEP key. These alpha-numeric and numeric strings of digits allow for encryption of any data you send or receive and also make it difficult for any would-be identity thieves to get access to your device in a 'hot spot'.

It is also worth removing any data from your mobile telephone's memory card as soon as you return home or to your office. Save this information to a desktop PC and delete it from your memory card. If you mobile telephone is lost or stolen then the memory card is one of the first places an identity thief will look in order to try and establish what they can about you.

You might also like...
Share Your Story, Join the Discussion or Seek Advice..
Why not be the first to leave a comment for discussion, ask for advice or share your story...

If you'd like to ask a question one of our experts (workload permitting) or a helpful reader hopfully can help you... We also love comments and interesting stories

Title:
(never shown)
Firstname:
(never shown)
Surname:
(never shown)
Email:
(never shown)
Nickname:
(shown)
Comment:
Validate:
Enter word:
Topics
Latest Comments
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Niknak74 - Your Question:My daughters father is an illegal immigrant who has lied and abused me and my family. He has recently…
    4 February 2016
  • Niknak74
    Re: Your National Insurance Number
    My daughters father is an illegal immigrant who has lied and abused me and my family. He has recently been prosecuted for using…
    3 February 2016
  • rill i am
    Re: Your National Insurance Number
    Hi I worked for a media company in P.boro uk for six years, throughout this whole time they were using a different NI number on…
    30 January 2016
  • Aviary
    Re: Who Can See What You Look at on the Internet?
    It is not good to have your device hacked. People should be more carefully. This world is definitely messed…
    28 January 2016
  • spitfire
    Re: Q & A: Reporting Identity Theft
    my daughter has used my name and address to get goods on line now I have been left with bill and been threaten with court…
    18 January 2016
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Nicole - Your Question:Hi my name is Nicole I need some advice.My bank account was recently hacked on which all my money was…
    13 January 2016
  • Nicole
    Re: Your National Insurance Number
    Hi my name is Nicole I need some advice. My bank account was recently hacked on which all my money was taken this has all…
    12 January 2016
  • Adrian
    Re: Your National Insurance Number
    My Walet was stolen while I had my NINO in it. Can please advise me what I need to do ?
    11 January 2016
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Laura - Your Question:Hey, I'm Laura and I started working from the age of 16, I worked in a restaurant in Northern Ireland for…
    6 January 2016
  • Laura
    Re: Your National Insurance Number
    Hey, I'm Laura and I started working from the age of 16, I worked in a restaurant in Northern Ireland for 3 years. When I first…
    5 January 2016
Further Reading...
Our Most Popular...
Add to my Yahoo!
Add to Google
Stumble this
Add to Twitter
Add To Facebook
RSS feed
You should seek independent professional advice before acting upon any information on the AboutIdentityTheft website. Please read our Disclaimer.