Kill Switch the Game Changer

Have you heard of Apple’s “Kill Switch”? If not, then you might want to look into it. This feature is the new theft deterrent system that will allow the owner of the device to remotely lock it and wipe it clean if ever lost or stolen. If I might say so myself… it’s about time!

In 2013, more than 3 million cellphones were stolen according to Consumer Reports. These days the average price of a premium phone is $585, not only making this an expensive loss but an attractive target for thieves as they can easily resell your stolen device.

A cellphone no longer is just an address book, it contains many aspects of a person’s life, ranging from photos, videos, social media access, banking information etc. So when the theft does occur it can cause many stresses to the victim on a variety of levels. According to IDG research 50% of phone theft victims would pay $500 to get their devices back, and 33% would pay up to $1000. If you think about it, that is a small price to pay to get your “life” back.

This feature is giving Apple device owners more comfort in knowing their personal data is protected from thieves. According to Reuters, the “Kill Switch” has greatly decreased iPhone thefts as thieves are finding the device useless. This feature is the new game changer when it comes to cellphone theft, putting the control back in the owners’ hands where it belongs.

Now to think about key management as part of your organization’s strategy, especially if using mobile devices. Having a data encryption solution with an industry-leading key management engine should be a priority for all businesses.

Previous Post
PCI DSS 3.0 and Encryption
Next Post
Maturity Model

Related Posts

Personal Security Vs iCloud

According to Business Insider, if your iCloud account has been hacked, a full backup of your account can be downloaded. This gives the hacker complete access to all your personal information. Here is a scarier thought, not only will the…
Read more
Enterprise Encryption for Linux

Enterprise Encryption for Linux

Linux has built in encryption for several years now, yet enterprises still struggle with encryption on Linux laptops.  Why is that? To answer this question, let’s first review the disk encryption capabilities that are built into Linux: (more…)

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 15 seconds