Lost property: 40% of mobile devices left at airports will never be reclaimed

October 2006 Information Security

A survey into ‘Mobile device security at airports’ shows the Brits are lackadaisical – when it comes to losing mobile devices compared to many of their counterparts around the globe.

British travellers will be returning from their vacations this season, without their mobile phone or laptop because they lost it while travelling at a busy airport. But they do not care, because according to the findings of a survey released in August by Pointsec Mobile Technologies between 40-50% of people cannot be bothered trekking to the lost property office of a hectic airport to reclaim their mobile phone, laptop or PDA - they would prefer to claim from their insurance company or let their company provide them with a new upgraded version and enjoy their trip instead. However, there is a security risk attached to not claiming your mobile device. After three months they are auctioned by the airport and with one in four having no security on them (according to the lost property office) - they could become a potential security risk to the owner or their company!

This is not the case when it came to their European counterparts who were all keen to collect their laptops. However, they were in many cases also pretty carefree when it came to trying to trace their mobile phones.

In Sweden, 100% of laptops were reclaimed, except at their main airport at Arlanda where 75% were claimed. However, people in Sweden were far more lax about reclaiming their mobile phone with 60% on average being collected with just 30% collected at Arlanda airport.

The Norwegians were carefree when it came to trying to retrieve their mobile phones at Oslo's main airport with a tiny minority of just 10% going to collect their phones from the lost property office. However, they were far more vigilant when it came to reclaiming their laptops with 95% being reclaimed.

The Australians were also pretty keen to reclaim their laptops with an almost 100% reclaim rate in the four airports which were surveyed. But bizarrely in Brisbane, of the mobile phones that are handed in every week, absolutely none have been reclaimed.

It comes as no surprise that in Finland, the land of the mobile phone, just over half of people bothered to reclaim their mobile phone but 91% reclaimed their laptops.

One in four have no security on them

The survey into 'Mobile device security at airports' found that of the mobile devices that were handed into the lost property office in airports around the UK, one in four mobile phones or laptops had absolutely no security on them, with the staff being able to switch them on and start them up.

Peter Larsson, CEO for Pointsec, says: "Often people do not realise how valuable their information can be to others such as hackers, competitors or thieves. Most people keep personal and customer details on their mobile devices and in our experience it is when these contact details go missing that people and their companies really begin to worry."

Heathrow Airport alone has around five laptops and 10 mobile phones handed in every day with just 60% being reclaimed, the rest go to local auction houses after three months. This means that Heathrow Airport auctions around 730 lost laptops every year and 1460 mobile phones.

When Pointsec's researcher phoned the lost property office at London's Heathrow Airport they said that there had been a dramatic increase in the number of lost laptops since BAA had stepped up security. People now have to take their laptop out of their bags and turn them on to ensure they are not a security risk. It is then that people seem to leave their laptop behind in the security area of the departure lounge.

Pointsec's advice to people who travel with mobile devices is that if they are not secured with encryption or strong passwords and they have sensitive information that could be used by someone, you must make the effort to reclaim them. For people who encrypt their mobile device they need only worry about the cost of the lost device and not the data residing on it because once encrypted no one can get at the information.

For details contact Pointsec Mobile Technologies, www.pointsec.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
NEC XON disrupts sophisticated cyberattack
Information Security
NEC XON recently showcased its advanced cyberthreat detection and response capabilities by successfully thwarting a human-operated ransomware attack targeting a major service provider.

Read more...
What’s your cyber game plan?
Information Security
“Medium-sized businesses are often the easiest target for cyber criminals, because they are just digital enough to be vulnerable, but not mature enough to be fully protected," says Warren Bonheim, MD of Zinia.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.