Home > ID Theft & the Law > Mobile Telephones and Data Theft

Mobile Telephones and Data Theft

By: Jack Claridge - Updated: 18 Oct 2012 | comments*Discuss
 
Mobile Telephones Laptop Wireless Device

Most of us now are in possession of a mobile telephone which we use for more than just making telephone calls. Although these mobile telephones were initially designed so that we could communicate with each other over large distances they have now taken on a more administrative dimension and see us using them for storing personal information as well as producing complex word processing and spreadsheet documents.

The Modern Office on the Move

Mobile technology has progressed to such an extent these days that many individuals can conduct business using their mobile telephones. In saying this of course we are excluding the making of telephone calls and are referring in no small part to the use of emails, spreadsheets, word processing documents and also the use of our telephones as dictation and camera devices.

Wi-Fi Technology

Wi-Fi (Wireless Fidelity) is one of the newest ways of using both mobile telephones and computer technology to access the Internet. The basic principle of Wi-Fi is that it can pick up the Internet in so-called 'hot spots' using a built in wireless modem. This wireless signal is relayed and used to transmit and receive data and calls in the same way as mobile telephones transmit and receive calls.

The Dangers of Data Theft

Using mobile telephones on the move - especially whilst using so-called Wi-Fi technology - can lead to a whole host of problems, the main one being the very real danger of data theft. Some mobile and wireless devices are not securely protected and as a result they are left open to hacking by individuals who scour these 'hot spots' looking for unprotected devices.

If a telephone or wireless laptop is not correctly protected then once it is 'seen' in a 'hot spot' then it can be accessed by another mobile telephone or laptop and at this point information can be downloaded or accessed whilst the individual is within that area.

Indeed many often are unaware that this is actually occurring and may never find out until such times as they find their identity is being used for purposes other than those it was originally intended or if their computers or telephones have been accessing sites that a user would not normally visit.

Protecting Your Data

One of the easiest and most common ways of securing your data on a mobile telephone or laptop - especially if they are accessing the Internet - is to encrypt your wireless connection. Most mobile telephones - Blackberry devices included - along with laptop wireless devices will allow you to provide what is known as a WPA or WEP key. These alpha-numeric and numeric strings of digits allow for encryption of any data you send or receive and also make it difficult for any would-be identity thieves to get access to your device in a 'hot spot'.

It is also worth removing any data from your mobile telephone's memory card as soon as you return home or to your office. Save this information to a desktop PC and delete it from your memory card. If you mobile telephone is lost or stolen then the memory card is one of the first places an identity thief will look in order to try and establish what they can about you.

You might also like...
Share Your Story, Join the Discussion or Seek Advice..
Why not be the first to leave a comment for discussion, ask for advice or share your story...

If you'd like to ask a question one of our experts (workload permitting) or a helpful reader hopfully can help you... We also love comments and interesting stories

Title:
(never shown)
Firstname:
(never shown)
Surname:
(never shown)
Email:
(never shown)
Nickname:
(shown)
Comment:
Validate:
Enter word:
Topics
Latest Comments
  • Louise
    Re: Your National Insurance Number
    Hi. Can a national insurance card be used to find someone's bank details out ? I currently filled some details regarding a tax…
    11 January 2017
  • PRA
    Re: Your National Insurance Number
    My employer had a data breach of my NI number and it took them over two months to inform me of the breach. This seems too long.…
    23 December 2016
  • A.K
    Re: Your National Insurance Number
    I was waiting on a letter from HMRC - my new tax code. It always has a note of my FULL national insurance number, FULL name…
    20 December 2016
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Vhp - Your Question:My ex employer has been using my NI without me knowing and I have been paying tax every month and few weeks…
    8 December 2016
  • Vhp
    Re: Your National Insurance Number
    My ex employer has been using my NI without me knowing and i have been paying tax every month and few weeks back I received a…
    8 December 2016
  • Idiot
    Re: Your National Insurance Number
    I foolishly believed my no ex that he was putting my name on the farm buiness for a farm he had ust bought in Huntly and as part…
    2 December 2016
  • Dee
    Re: Your National Insurance Number
    Hi! Had literally left a rucksack in my car outside my house for a few minutes. In those few minutes the rucksack was gone. The…
    1 December 2016
  • AboutIdentityTheft
    Re: Your National Insurance Number
    C7are - Your Question:Hi can the council come to your home on a Sunday saying they need your national insurance number.
    7 November 2016
  • C7are
    Re: Your National Insurance Number
    Hi can the council come to your home on a Sunday saying they need your national insurance number...
    6 November 2016
  • AboutIdentityTheft
    Re: Your National Insurance Number
    Coops - Your Question:I have been asked to provide my national insurance number to an insurance claim company after a road…
    31 October 2016
Further Reading...
Our Most Popular...
Add to my Yahoo!
Add to Google
Stumble this
Add to Twitter
Add To Facebook
RSS feed
You should seek independent professional advice before acting upon any information on the AboutIdentityTheft website. Please read our Disclaimer.