Smartphone-based, common control for unmanned systems enhances service member situational awareness at the tactical edge.
“Remote wipe” is a term you’ll hear a lot when it comes to managing smartphones and tablets, especially regarding security, loss and theft. The idea behind it is that if a device is lost or stolen, someone can send a command that will completely remove stored data. That protects the company’s valuable assets and reduces the risk of breach or compromise.
Since a data breach costs an enterprise on average $3.9 million, aggressively wiping a lost phone is pretty good business sense. With this in mind, it’s worth taking a few minutes to understand remote wipe and the implications it has for your employees’ smartphones.
1. Remote wipe requires power and a network connection
Since “wipe” is a command that is sent to a device, it has to be turned on, connected to the network, and able to receive the protocol. If a device is lost at an airport, it may be easy to wipe. On the other hand, if someone wants to keep the device from being wiped, it’s easy to power it off, shield it or pop out the SIM card.
This means that when a device goes missing, it’s important to let your IT department know about it as soon as possible, as the window for wiping can be very brief. When a device is stolen, it can be a matter of seconds before data is compromised.
2. Remote wipe is not monolithic
Today’s mobile devices and management systems have a wide variety of options for remote erasure. In certain cases, it can be used to send the device back to factory reset status. In others, it can be subtler. For example, some setups have “enterprise wipe,” which only deletes the applications and data that were installed by the company, leaving personal data untouched. Phones that have a container setup, such as an Android Enterprise work profile, may only have the work profile wiped, since your organization is more concerned with those assets.
One of the ideas behind enterprise wipe is that it can be used when someone leaves the company without properly deregistering their own smartphone. In that case, they may still be storing personal data, so just deleting the enterprise data makes more sense.
How to build an effective incident response plan
Get this free guide on how to respond to mobile security breaches — or thwart them altogether. Download Now
Another variation of erasure is often called “KeepAlive.” With KeepAlive, the device must check in with the company’s MDM/EMM tools over the network every so often. If the device goes missing for too long, then it will automatically take action, such as a complete device reset. The idea behind KeepAlive is that if your phone is stolen and then disconnected from the network, data will still remain protected.
KeepAlive isn’t universally used, and can have some false positives if the MDM/EMM system is disconnected for too long. However, it’s another tool for your IT manager, and if they’re using it, you should be aware of it.
3. Employees should be forewarned
Remote wiping is generally included with all MDM/EMM tools, so no matter which one your company is using, there is probably some level of erasure capability on employee smartphones. For corporate-owned devices, employees may naturally expect that they can be wiped at any time.
However, in the case of Bring Your Own Device (BYOD) policies, IT admins may still have the ability to remotely wipe devices if employees are required to install an EMM/MDM agent or antimalware tools on their phone or tablet. Organizations should spell this out clearly in their BYOD policy, which employees sign before gaining access to corporate systems on their personal devices.
For organizations that do not have a MDM/EMM solution in place, remote wiping may be handled on a per-app basis, which can mean blocking access to an app and removing associated data when a user’s device is believed to be compromised. When users enroll in those services, a screen often pops up telling them that this is part of the terms and conditions.
Employees may not like the idea that IT has the ability to remote wipe data from their personal device, but generally there is no other way to both provide full access to your company’s systems and maintain data security. From the business’ point of view, it’s an important measure to protect valuable informational assets.
A remote wipe policy is used by IT managers to help manage the risks presented by easily lost or stolen mobile devices. As an end user, understanding what remote wipe is capable of is beneficial if you find your technology compromised.
Keeping devices and their data truly secure requires comprehensive lifecycle device management. Samsung combines device security, deployment and management in Knox Suite, which includes Knox Platform for Enterprise, Knox Mobile Enrollment, Knox Manage and Knox E-FOTA in a single license with one sign-on.
Learn more about how Samsung Knox Suite keeps your devices — and your business — protected. And discover best practices for thwarting mobile security breaches and responding when they occur in our guide, Building a Cyber Incident Response Plan.