Secondhand smartphones sold with bank details

Many people are flogging their mobiles but leaving valuable data, such as bank account details, on the device.

Smartphone

Over half of secondhand mobile phones retain important personal data of the original owner, research has shown.

The investigation, from advisory body CPP, found 247 separate pieces of personal data on a range of mobile phones and SIM cards which had been sold either online or through secondhand electronics shops.

The data included credit card PIN numbers, bank account details, passwords, company information and login details to social networking sites like Facebook and LinkedIn.

A survey conducted as part of the research found half of secondhand mobile owners had discovered personal data from previous users on their devices.

"This report is a shocking wake up call and shows how mobile phones can inadvertently cause people to be careless with their personal data," said CPP's mobile data expert, Danny Harrison.

"With the rapid technology advancements in the smartphone market and new models released by manufactures multiple times a year, consumers are upgrading their mobiles more than ever and it is imperative people take personal responsibility to properly manage their own data."

Jason Hart, who was commissioned by CPP to carry out the experiment, said the best way to remove data from a SIM is simply to destroy it completely.

He recommended users double checked all their information had been removed before selling a device on.

"With new technology does come new risks and our experiment found that newer smartphones have more capabilities to store information and that information is much easier to recover than on traditional mobiles due to the increase of applications," Hart added.

Managing what data employees are storing on mobile devices has been a growing issue for businesses.

In recent research from Symantec, nearly two thirds of surveyed firms said they recognised the risk of insecure mobile devices connecting to company networks - up 13 per cent from 2009.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021