How To Safely Retire Mobile Devices
One company destroyed an old server it had replaced by dousing it in Thermite and setting it ablaze in the company’s parking lot.
“We lit it on fire and watched it” get destroyed, says Tyler Shields of the extreme data-wiping incident at one of his former employers. “That’s one effective way to do it, certainly.”
But unless your company’s smartphones or tablets are used by the President of the United States or contain classified or highly sensitive information, there’s no need for pyrotechnics to ensure that older mobile devices don’t leak data, says Shields, a senior analyst for security and risk management at Forrester Research.
Just how to properly purge employees’ smartphones and tablets when they return to work after Christmas with their new devices to replace them is a major holiday headache for IT and security teams. The number of employee-owned smartphones and tablets continues to skyrocket: the devices will number more than 1 billion by 2018, according to Juniper Research.
So what to do with the older devices when the shiny new ones from Santa come to the office?
“Most people are working on their second- or third generation of smartphone or tablet, so they’re going to be disposing of them” in lieu of new ones, says David Lingenfelter, information security officer at mobile device management firm Fiberlink. “A majority of them keep them, and 58 percent are going to keep them inactive. That’s not bad, but that typically means they’re being passed on to their children, and they will do something with them.”
Lingenfelter says a Harris survey commissioned by Fiberlink last year found that 68 percent of the workforce does not professionally wipe or destroy their devices.
[With employees bringing their smartphones and tablets into the workplace, companies need to work to limit the threat posed by mobile applications. See 5 Steps To Managing Mobile Vulnerabilities .]
Here are some basic rules of thumb for users recycling or disposing of a smartphone or tablet:
Activate the factory wipe feature
Before you hand down that tablet to your grade schooler, wipe it using the “factory data reset” function on an Android, for example, or the “Reset” function on an iPhone or iPad, for instance. That wipes all data and any apps you added from the device, and it returns to its out-of-the-box unregistered setting.
“The little things you don’t necessarily think of when you’re passing the device on to your children: children like to click on things, and they may make a mistake and adjust your finances” if you don’t wipe the tablet, for instance, Lingenfelter says. “Go back to factory defaults, so the kids can set it up [for] themselves and your personal and corporate information is gone.”
Sometimes going through the wipe process twice makes sense to ensure the device is clean, he says.
Don’t forget to remove the SD card
This is a common oversight: a user wipes the phone properly, but leaves the SD card in place, which may be storing data. The factory reset doesn’t touch the card, security experts say. This is an issue with many Android devices. “You have to remember to take the card out,” Lingenfelter says.
Some Android users configure their apps to save the SD card first, notes Forrester’s Shields. “Pull the card and replace it with a new one. Then A, you’ve got a backup copy of the data, and B, you don’t have to worry about any secure wipe technologies,” he says.
And any SIM card also should be pulled out when you deactivate a phone, Lingenfelter says. “A lot of SIMs can keep a copy of your contact list,” he says.
School your employees on your organization’s decommissioning procedures
Even when mobile device management (MDM) technology is in place, things can go awry when mobile devices are retired. “Once [the device] is disconnected from MDM, all is safe and secure is not always the case,” Shields says. “People may be lulled into a false sense of security. The device now yours is not always 100 percent secure.”
Organizations should consider a default factory reset wipe whenever a user or his or her device leaves the organization. “Then you make sure there are no fragments slipped outside the network,” he says.
And be sure employees are educated on the procedures for retiring or recycling a personal mobile device. “A lot of companies now implement MDM, with containerization, where all enterprise software and data stays in one section [of the device] and is not able to be contacted by personal software or leaked out by Dropbox,” or another app, says Lingenfelter.
Users should notify IT when they bring in their new Christmas iPad, for example. “If they are going to use it for work, you have to make sure they take the proper steps,” he says.
But keep in mind that even the best decommissioning practices can be bypassed by clever hacks. “At the end of the day, you’re never going to guarantee complete security when you’re selling your phone. There are all sorts of extremely advanced attacks,” Forrester’s Shields says. “If you’re paranoid about it, don’t sell it. Destroy it.”
Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.