
{"id":1707,"date":"2011-12-21T00:00:00","date_gmt":"2011-12-21T00:00:00","guid":{"rendered":"http:\/\/otava.test\/mobile-security-how-safe-is-your-data\/"},"modified":"2011-12-21T00:00:00","modified_gmt":"2011-12-21T00:00:00","slug":"mobile-security-how-safe-is-your-data","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/","title":{"rendered":"Mobile Security: How Safe is Your Data?"},"content":{"rendered":"<p>According to a recent Gartner study, smartphones accounted for 297 million (19%) of the 1.6 billion mobile phones sold in 2010. That\u2019s 72.1% more smartphone sales than in 2009 and it doesn\u2019t appear to be slowing down for 2011 and beyond. The advancements that have been made in the mobile market have been nothing more than unbelievable. Your phone is not only a means of verbal communication, but an email-checking, web-browsing multimedia device. With that however, more and more of our personal information becomes increasingly vulnerable with all of these new features.<\/p>\n<p>A lot of sensitive information is easily accessible on our phones these days, especially with the trend of using personal devices in workplace environments. Corporate emails, social media accounts, and bank apps are on our phones to check at our own convenience on a daily basis with most of our passwords saved on each account for easy access. What would happen if SOMEONE ELSE had access to that kind of information? To YOUR personal information? To YOUR company\u2019s sensitive information?<\/p>\n<p>If your company stores, transmits or processes PHI (Protected Health Information) or CHD (Cardholder Data), you need to be aware of the dangers of that data landing in the wrong hands due to poor mobile phone security. Not only that, but both <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> and <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a> compliance regulations assign large fines and penalties in the event of a data breach.<\/p>\n<figure id=\"attachment_4220\" aria-describedby=\"caption-attachment-4220\" style=\"width: 207px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4220 \" title=\"Smartphone Pin Screenshot\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png\" alt=\"Smartphone Pin Screenshot\" width=\"207\" height=\"311\" \/><figcaption id=\"caption-attachment-4220\" class=\"wp-caption-text\">Smartphone Pin Screenshot<\/figcaption><\/figure>\n<p>Take this incident as an example &#8211; back in February 2011, my smartphone fell out of my pocket into the snow and I was unable to find it after an hour or so of digging. One month rolls by and someone had called in to say they found it in the snow. Fortunately, that person turned it in, but that\u2019s not always how these types of stories end.\u00a0Someone could have picked up my phone, and if I had no type of security measures in place, they would have had immediate access to ALL of my sensitive information.<\/p>\n<p>The only thing that kept me safe from somebody accessing all of my personal information was implementing a PIN on my phone. Without it, ANYONE could have had access to anything I had stored on my phone within a few minutes of finding it. Bank accounts, confidential emails, personal information on social sites&#8230;the possibilities are endless.<\/p>\n<p>However, there is even opposition from some consumers on putting these kinds of security measures into place! A study by Confident Technologies showed that 44% of smartphone users said it was too much of a hassle to lock their phone with a PIN or password, and 30% said they weren\u2019t too worried about security. Yes, it can be a pain to enter your PIN or password every time you access your phone, but it\u2019s worth it in the long run in order to avoid a situation in which your sensitive data could be accessed and misused.<\/p>\n<p>Despite consumer response, mobile security is still getting better as some companies are starting to offer services that wipe phones remotely and even locate them via GPS if they are lost or stolen. However, we as consumers need to implement our own security measures to ensure our information is in the right hands and above all, safe and secure.<\/p>\n<p>Sources:<br \/>\n<a href=\"https:\/\/www.informationweek.com\/blog\/mobility\/231700155\">Most Consumers Don\u2019t Lock Mobile Phone Via PIN<\/a><br \/>\n<a href=\"https:\/\/www.informationweek.com\/blog\/230600092\">10 Combinations Dominate iPhone Passwords<\/a><br \/>\n<a href=\"https:\/\/www.email-marketing-reports.com\/wireless-mobile\/smartphone-statistics.htm\">Smartphone Statistics and Market Share<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a recent Gartner study, smartphones accounted for 297 million (19%) of the 1.6 billion mobile phones sold in 2010. That\u2019s 72.1% more smartphone sales than in 2009 and it doesn\u2019t appear to be slowing down for 2011 and beyond. The advancements that have been made in the mobile market have been nothing more than unbelievable. Your phone is not only a means of verbal communication, but an email-checking, web-browsing multimedia device. With that however, more and more of our personal information becomes increasingly vulnerable with all of these new features. A lot of sensitive information is easily accessible on our phones these days, especially with the trend of using personal devices in workplace environments. Corporate emails, social media accounts, and bank apps are on our phones to check at our own convenience on a daily basis with most of our passwords saved on each account for easy access. What would happen if SOMEONE ELSE had access to that kind of information? To YOUR personal information? To YOUR company\u2019s sensitive information? If your company stores, transmits or processes PHI (Protected Health Information) or CHD (Cardholder Data), you need to be aware of the dangers of that data landing in&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-1707","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Security: How Safe is Your Data? | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Security: How Safe is Your Data?\" \/>\n<meta property=\"og:description\" content=\"According to a recent Gartner study, smartphones accounted for 297 million (19%) of the 1.6 billion mobile phones sold in 2010. That\u2019s 72.1% more smartphone sales than in 2009 and it doesn\u2019t appear to be slowing down for 2011 and beyond. The advancements that have been made in the mobile market have been nothing more than unbelievable. Your phone is not only a means of verbal communication, but an email-checking, web-browsing multimedia device. With that however, more and more of our personal information becomes increasingly vulnerable with all of these new features. A lot of sensitive information is easily accessible on our phones these days, especially with the trend of using personal devices in workplace environments. Corporate emails, social media accounts, and bank apps are on our phones to check at our own convenience on a daily basis with most of our passwords saved on each account for easy access. What would happen if SOMEONE ELSE had access to that kind of information? To YOUR personal information? To YOUR company\u2019s sensitive information? If your company stores, transmits or processes PHI (Protected Health Information) or CHD (Cardholder Data), you need to be aware of the dangers of that data landing in...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-21T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Mobile Security: How Safe is Your Data?\",\"datePublished\":\"2011-12-21T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\"},\"wordCount\":573,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\",\"url\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\",\"name\":\"Mobile Security: How Safe is Your Data? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png\",\"datePublished\":\"2011-12-21T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security: How Safe is Your Data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Security: How Safe is Your Data? | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Security: How Safe is Your Data?","og_description":"According to a recent Gartner study, smartphones accounted for 297 million (19%) of the 1.6 billion mobile phones sold in 2010. That\u2019s 72.1% more smartphone sales than in 2009 and it doesn\u2019t appear to be slowing down for 2011 and beyond. The advancements that have been made in the mobile market have been nothing more than unbelievable. Your phone is not only a means of verbal communication, but an email-checking, web-browsing multimedia device. With that however, more and more of our personal information becomes increasingly vulnerable with all of these new features. A lot of sensitive information is easily accessible on our phones these days, especially with the trend of using personal devices in workplace environments. Corporate emails, social media accounts, and bank apps are on our phones to check at our own convenience on a daily basis with most of our passwords saved on each account for easy access. What would happen if SOMEONE ELSE had access to that kind of information? To YOUR personal information? To YOUR company\u2019s sensitive information? If your company stores, transmits or processes PHI (Protected Health Information) or CHD (Cardholder Data), you need to be aware of the dangers of that data landing in...","og_url":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/","og_site_name":"OTAVA","article_published_time":"2011-12-21T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Mobile Security: How Safe is Your Data?","datePublished":"2011-12-21T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/"},"wordCount":573,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/","url":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/","name":"Mobile Security: How Safe is Your Data? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png","datePublished":"2011-12-21T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/photo.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/mobile-security-how-safe-is-your-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Mobile Security: How Safe is Your Data?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1707"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1707\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1707"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}