Lost property: 40% of mobile devices left at airports will never be reclaimed

October 2006 Information Security

A survey into ‘Mobile device security at airports’ shows the Brits are lackadaisical – when it comes to losing mobile devices compared to many of their counterparts around the globe.

British travellers will be returning from their vacations this season, without their mobile phone or laptop because they lost it while travelling at a busy airport. But they do not care, because according to the findings of a survey released in August by Pointsec Mobile Technologies between 40-50% of people cannot be bothered trekking to the lost property office of a hectic airport to reclaim their mobile phone, laptop or PDA - they would prefer to claim from their insurance company or let their company provide them with a new upgraded version and enjoy their trip instead. However, there is a security risk attached to not claiming your mobile device. After three months they are auctioned by the airport and with one in four having no security on them (according to the lost property office) - they could become a potential security risk to the owner or their company!

This is not the case when it came to their European counterparts who were all keen to collect their laptops. However, they were in many cases also pretty carefree when it came to trying to trace their mobile phones.

In Sweden, 100% of laptops were reclaimed, except at their main airport at Arlanda where 75% were claimed. However, people in Sweden were far more lax about reclaiming their mobile phone with 60% on average being collected with just 30% collected at Arlanda airport.

The Norwegians were carefree when it came to trying to retrieve their mobile phones at Oslo's main airport with a tiny minority of just 10% going to collect their phones from the lost property office. However, they were far more vigilant when it came to reclaiming their laptops with 95% being reclaimed.

The Australians were also pretty keen to reclaim their laptops with an almost 100% reclaim rate in the four airports which were surveyed. But bizarrely in Brisbane, of the mobile phones that are handed in every week, absolutely none have been reclaimed.

It comes as no surprise that in Finland, the land of the mobile phone, just over half of people bothered to reclaim their mobile phone but 91% reclaimed their laptops.

One in four have no security on them

The survey into 'Mobile device security at airports' found that of the mobile devices that were handed into the lost property office in airports around the UK, one in four mobile phones or laptops had absolutely no security on them, with the staff being able to switch them on and start them up.

Peter Larsson, CEO for Pointsec, says: "Often people do not realise how valuable their information can be to others such as hackers, competitors or thieves. Most people keep personal and customer details on their mobile devices and in our experience it is when these contact details go missing that people and their companies really begin to worry."

Heathrow Airport alone has around five laptops and 10 mobile phones handed in every day with just 60% being reclaimed, the rest go to local auction houses after three months. This means that Heathrow Airport auctions around 730 lost laptops every year and 1460 mobile phones.

When Pointsec's researcher phoned the lost property office at London's Heathrow Airport they said that there had been a dramatic increase in the number of lost laptops since BAA had stepped up security. People now have to take their laptop out of their bags and turn them on to ensure they are not a security risk. It is then that people seem to leave their laptop behind in the security area of the departure lounge.

Pointsec's advice to people who travel with mobile devices is that if they are not secured with encryption or strong passwords and they have sensitive information that could be used by someone, you must make the effort to reclaim them. For people who encrypt their mobile device they need only worry about the cost of the lost device and not the data residing on it because once encrypted no one can get at the information.

For details contact Pointsec Mobile Technologies, www.pointsec.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.