Mobile Device Security: Preventing Unauthorized Access to Sensitive Information

Preventing Unauthorized Access to Sensitive Information on Lost Mobile Devices

Prev Question Next Question

Question

A corporation is concerned that, if a mobile device is lost, any sensitive information on the device could be accessed by third parties.

Which of the following would BEST prevent this from happening?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Of the options provided, the best way to prevent sensitive information from being accessed on a lost mobile device is to initiate remote wiping.

Option A, Initiate remote wiping on lost mobile devices, allows a company to remotely erase all data on a lost or stolen device. This can be done through various mobile device management (MDM) solutions, which can wipe the device as soon as it is reported lost or stolen. This solution ensures that any sensitive information on the device is not accessible by third parties.

Option B, Use FDE and require PINs on all mobile devices, is a good security practice but may not be enough to prevent unauthorized access to sensitive information on a lost device. Full Disk Encryption (FDE) ensures that data on the device is encrypted, making it difficult to access without the correct password or PIN. However, if the device is lost and the password or PIN is compromised, the data can still be accessed.

Option C, Use geolocation to track lost devices, can help locate lost devices, but it does not prevent sensitive information from being accessed. Geolocation can help track the device, but it does not ensure the data on the device is protected.

Option D, Require biometric logins on all mobile devices, is a good security practice, but it may not be enough to prevent unauthorized access to sensitive information on a lost device. Biometric authentication, such as fingerprint or facial recognition, ensures that only authorized users can access the device. However, if the device is lost, the biometric data can potentially be bypassed, and the data can still be accessed.

In summary, the best way to prevent sensitive information from being accessed on a lost mobile device is to initiate remote wiping on lost mobile devices.