Lost property: 40% of mobile devices left at airports will never be reclaimed

October 2006 Information Security

A survey into ‘Mobile device security at airports’ shows the Brits are lackadaisical – when it comes to losing mobile devices compared to many of their counterparts around the globe.

British travellers will be returning from their vacations this season, without their mobile phone or laptop because they lost it while travelling at a busy airport. But they do not care, because according to the findings of a survey released in August by Pointsec Mobile Technologies between 40-50% of people cannot be bothered trekking to the lost property office of a hectic airport to reclaim their mobile phone, laptop or PDA - they would prefer to claim from their insurance company or let their company provide them with a new upgraded version and enjoy their trip instead. However, there is a security risk attached to not claiming your mobile device. After three months they are auctioned by the airport and with one in four having no security on them (according to the lost property office) - they could become a potential security risk to the owner or their company!

This is not the case when it came to their European counterparts who were all keen to collect their laptops. However, they were in many cases also pretty carefree when it came to trying to trace their mobile phones.

In Sweden, 100% of laptops were reclaimed, except at their main airport at Arlanda where 75% were claimed. However, people in Sweden were far more lax about reclaiming their mobile phone with 60% on average being collected with just 30% collected at Arlanda airport.

The Norwegians were carefree when it came to trying to retrieve their mobile phones at Oslo's main airport with a tiny minority of just 10% going to collect their phones from the lost property office. However, they were far more vigilant when it came to reclaiming their laptops with 95% being reclaimed.

The Australians were also pretty keen to reclaim their laptops with an almost 100% reclaim rate in the four airports which were surveyed. But bizarrely in Brisbane, of the mobile phones that are handed in every week, absolutely none have been reclaimed.

It comes as no surprise that in Finland, the land of the mobile phone, just over half of people bothered to reclaim their mobile phone but 91% reclaimed their laptops.

One in four have no security on them

The survey into 'Mobile device security at airports' found that of the mobile devices that were handed into the lost property office in airports around the UK, one in four mobile phones or laptops had absolutely no security on them, with the staff being able to switch them on and start them up.

Peter Larsson, CEO for Pointsec, says: "Often people do not realise how valuable their information can be to others such as hackers, competitors or thieves. Most people keep personal and customer details on their mobile devices and in our experience it is when these contact details go missing that people and their companies really begin to worry."

Heathrow Airport alone has around five laptops and 10 mobile phones handed in every day with just 60% being reclaimed, the rest go to local auction houses after three months. This means that Heathrow Airport auctions around 730 lost laptops every year and 1460 mobile phones.

When Pointsec's researcher phoned the lost property office at London's Heathrow Airport they said that there had been a dramatic increase in the number of lost laptops since BAA had stepped up security. People now have to take their laptop out of their bags and turn them on to ensure they are not a security risk. It is then that people seem to leave their laptop behind in the security area of the departure lounge.

Pointsec's advice to people who travel with mobile devices is that if they are not secured with encryption or strong passwords and they have sensitive information that could be used by someone, you must make the effort to reclaim them. For people who encrypt their mobile device they need only worry about the cost of the lost device and not the data residing on it because once encrypted no one can get at the information.

For details contact Pointsec Mobile Technologies, www.pointsec.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...
Surveillance and cybersecurity
Cathexis Technologies Information Security
Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...