Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:10 PM
Connect Directly

How To Safely Retire Mobile Devices

Once employees bring their new iPads, Androids, to work after Christmas, their older mobile devices must be decommissioned to protect company data

One company destroyed an old server it had replaced by dousing it in Thermite and setting it ablaze in the company's parking lot.

"We lit it on fire and watched it [get destroyed]," says Tyler Shields, who witnessed the extreme data-wiping incident at one of his former employers. "That's one effective way to do it, certainly."

But unless your company's smartphones or tablets are used by the President of the United States or contain classified or highly sensitive information, pyrotechnics aren't necessary to ensure that older mobile devices don't leak data, says Shields, a senior analyst for security and risk management at Forrester Research.

Just how to properly purge employees' older smartphones and tablets when they return to work after Christmas with their new devices is a major holiday headache for IT and security teams. The number of employee-owned smartphones and tablets continues to skyrocket: The devices will number more than 1 billion by 2018, according to Juniper Research.

"Most people are working on their second or third generation of smartphone or tablet, so they're going to be disposing of them [in lieu of new ones]," says David Lingenfelter, information security officer at mobile device management firm Fiberlink. "A majority of them keep them, and 58 percent are going to keep them inactive. That's not bad, but that typically means they're being passed on to their children, and they will do something with them."

Lingenfelter says a Harris survey commissioned by Fiberlink last year found that 68 percent of the workforce does not professionally wipe or destroy their devices.

[With employees bringing their smartphones and tablets into the workplace, companies need to work to limit the threat posed by mobile applications. See 5 Steps To Managing Mobile Vulnerabilities .]

Here are some basic rules of thumb for users recycling or disposing of a smartphone or tablet:

Activate the factory wipe feature.
Before you hand down that tablet to your grade schooler, wipe it using, for example, the "factory data reset" function on an Android or the "Reset" function on an iPhone or iPad. That wipes all data and any apps you added from the device, which returns to its out-of-the-box unregistered setting.

"The little things you don't necessarily think of when you're passing the device on to your children -- children like to click on things, and they may make a mistake and adjust your finances" if you don't wipe the tablet, for instance, Lingenfelter says. "Go back to factory defaults, so the kids can set it up [for] themselves and your personal and corporate information is gone."

Sometimes going through the wipe process twice makes sense to ensure the device is clean, he says.

Don't forget to remove the SD card.
This is a common oversight: A user wipes the phone properly, but leaves the SD card in place, which may be storing data. The factory reset doesn't touch the card, security experts say. This is an issue with many Android devices. "You have to remember to take the card out," Lingenfelter says.

Some Android users configure their apps to save the SD card first, notes Forrester's Shields. "Pull the card and replace it with a new one. Then, A, you've got a backup copy of the data, and, B, you don't have to worry about any secure wipe technologies," he says.

And any SIM card also should be pulled out when you deactivate a phone, Lingenfelter says. "A lot of SIMs can keep a copy of your contact list," he says.

School your employees on your organization's decommissioning procedures.
Even when mobile device management (MDM) technology is in place, things can go awry when mobile devices are retired. "Once [the device] is disconnected from MDM, all is safe and secure is not always the case," Shields says. "People may be lulled into a false sense of security. The device now yours is not always 100 percent secure."

Organizations should consider a default factory reset wipe whenever a user or his or her device leaves the organization. "Then you make sure there are no fragments slipped outside the network," he says.

And be sure employees are educated on the procedures for retiring or recycling a personal mobile device. "A lot of companies now implement MDM, with containerization, where all enterprise software and data stays in one section [of the device] and is not able to be contacted by personal software or leaked out by Dropbox" or another app, says Lingenfelter.

Users should notify IT when they bring in their new Christmas iPads, for example. "If they are going to use it for work, you have to make sure they take the proper steps," he says.

But keep in mind that even the best decommissioning practices can be bypassed by clever hacks. "At the end of the day, you're never going to guarantee complete security when you're selling your phone. There are all sorts of extremely advanced attacks," Forrester's Shields says. "If you're paranoid about it, don't sell it. Destroy it."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-03
Pimcore is an open source digital experience platform. In Pimcore before version 6.8.5 it is possible to modify & create website settings without having the appropriate permissions.
PUBLISHED: 2020-12-02
PHP remote file inclusion in the assign_resume_tpl method in Application/Common/Controller/BaseController.class.php in 74CMS before 6.0.48 allows remote code execution.
PUBLISHED: 2020-12-02
The Victor CMS v1.0 application is vulnerable to SQL injection via the 'search' parameter on the search.php page.
PUBLISHED: 2020-12-02
SQL injection vulnerability in BloodX 1.0 allows attackers to bypass authentication.
PUBLISHED: 2020-12-02
An SQL injection vulnerability was discovered in Online Doctor Appointment Booking System PHP and Mysql via the q parameter to getuser.php.