PCMag SecurityWatch

 How to safely get rid of your old phones.

Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.

Accessed on 12 July 2022, 1537 UTC.

Content provided by email subscription to "PCMag SecurityWatch."

Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGpGwhzpkXwNtgqCbPchrvSftst

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)


Trouble viewing this email? View in a browser
PCMag SecurityWatch
How to Safely Get Rid of All Your Old Phones
I made a strange discovery while unpacking in my new home office last week. I opened a medium-sized box expecting to find a couple of keyboards or maybe my lost Cricut machine and found a graveyard of smart devices instead. Under a mass of wires and cords, I unearthed one Samsung Galaxy S7, four iPhones, three Kindles, one Kindle Fire, and two iPads. 

Every time I move, I inevitably transfer my old and obsolete tech from a desk drawer to a box and then forget about it. I’d like to break that cycle and declutter my tech responsibly by trading in my devices, but I need to find the time to back up my personal data and make sure I completely erase all my private information before handing over my old phones and tablets to a stranger. I also don’t want to walk into my mobile service carrier’s store and go through a long trade-in process for my devices. It’s easier to just buy a new phone and chuck the old one into a drawer. 


Leaving Money on the Table (or in a Box)

I’m not alone with my pile of old tech. A new study from device lifecycle management company MCE shows that on average, American households have four or more obsolete or broken mobile devices sitting in drawers. The unused tech could provide value to consumers either in the form of cash or by lowering the price of a new device at trade-in. 

Furthermore, of the 3,000 US survey respondents, 42% said they had never traded in a mobile device, and 58% percent said they experienced a long or frustrating trade-in process. More than a third of the respondents who had never traded in a device said that data backup and privacy concerns kept them from giving up their old devices in exchange for cash or account statement credits. 


How Sellers Can Improve the Mobile Device Trade-in Process

The MCE study shows that customers want convenience, price transparency, speed, and privacy at all points in the mobile device buying and trade-in processes. More than 40% of respondents said knowing that the data on their old phone was completely erased would make them more likely to trade in the device.

MCE offered viable suggestions for mobile device sellers to improve the trade-in process. 

  • Sellers could offer an app-based trade-in process. Instead of requiring an in-store visit to trade in a device, smart tech companies could create an app that guides consumers through transferring their data securely, printing a shipping label for their old device, and choosing a new device from the carrier.

  • Sellers should provide a price guarantee for trade-ins. 62% of the US consumers surveyed believe they won't get a fair price when trading in their mobile device, and nearly a third of respondents claimed they received different price quotes at different stages of the trade-in process. Take the guesswork out of trading in old tech and earn consumer trust with a guarantee that the initial cash or credit offer for a device is what they’ll get when the trade is complete.

  • Speed is key. More than 40% of survey respondents said their mobile device trade-in process took more than half an hour. Cutting down the number of steps people have to go through to trade in their devices could help to speed up the process, and lead more consumers to offer up their phones and tablets for recycling.

  • Trade-ins must emphasize security.  More than one-third of respondents who didn’t consider doing a trade-in were concerned about their privacy being compromised when trading in their mobile devices. Mobile device sellers should all offer step-by-step online guides for preparing devices for recycling.


Secure Your Mobile Device Before a Trade-In

Making sure to wipe your data from your Android or iPhone is just one step you should take prior to making a sale or trading in your device for a new one. Here are three steps to take to safely get rid of that smart device graveyard on your own while you wait for mobile carriers to make the recycling process smoother for consumers. 

  1. Back up the data stored locally on your device. PCMag offers guides for backing up your iOS device and backing up Android phones or tablets.

  2. Disable tracking apps and remove the device from your associated accounts. Turn off Apple's Find My (the app that offers device tracking) and Google Activation Locks on your smart device. You can also manage your Amazon smart devices online. Removing the old phone or tablet from the list of devices associated with your account prevents new owners from being able to access information about you, such as your name, birth date, and home address.

  3. Completely erase the mobile device after backing up your data to your computer or the cloud. If you’re using iOS, navigate to Settings>General>Transfer or Reset iPhone/iPad. Follow the prompts to erase your content and settings once you are sure you have backed up all of the data. Android users can find the Reset option in the Settings menu on their devices.

I recommend starting the trade-in process online, rather than in-store. Most of the major mobile cellular service providers offer online device trade-in assistance over the phone or via live chat. You may not be able to complete your trade-in from home, but you can make sure your information is in the company’s system and avoid a long wait for in-person assistance.

Get this email from a friend? Get it delivered to your inbox weekly. Sign up for the SecurityWatch newsletter.


What Else Is Happening in the Security World This Week?

Biden Acknowledges Link Between Reproductive Health Rights and Privacy. The recent Executive Order is partly focused on "protecting the privacy of patients and their access to accurate information."

CEO Arrested for Selling $1 Billion in Fake Cisco Hardware on Amazon, eBay. Onur Aksoy allegedly imported thousands of fake Cisco networking devices from China.

Several State Unemployment Portals Back Online After Cyberattack. Geographic Solutions restores unemployment benefit platforms in three states. The vendor expects all state workforce systems to be back online by the end of this week.

Apple Preps 'Lockdown Mode' to Fend Off Targeted Spyware Attacks. The security feature is coming to Apple operating systems later this year.

NIST Takes a Step Toward Quantum-Resistant Encryption. The agency chooses four algorithms for use in its "post-quantum cryptographic standard."

Save $50 on IPVanish VPN
TECH DEAL OF THE DAY
If you buy something from our links, we may get a commission from the sale. Learn more here.
Acer Nitro 5 Intel Core i5-10300H 15.6" 144Hz Gaming Laptop w/ NVIDIA RTX 3050
$839.99 $671.00  
GET DEAL

TODAY'S TOP NEWS
What Happens When Your Identity is Stolen?
The consequences of identity theft could range from replacing your credit cards to fighting to prove your innocence in court. PCMag lead security analyst Neil J. Rubenking recently examined the many ways identity thieves can ruin your life.

For a safer online experience, consider taking the following steps:
  • Subscribe to an identity theft protection service. These services provide early warning systems to alert you to potential fraud and they can also help you through the identity recovery process.
  • Enable multi-factor authentication wherever you can online. MFA is one way to make it tougher for crooks to access your accounts, even if they have your password.
  • If you find yourself recovering from an email account takeover, you should visit every site that's associated with that email address and change your password. Use a password manager to create and store your new complex and hard-to-guess passwords.
For other ways to recover from a hack or online identity theft scenario, check out PCMag’s advice for what to do when you’ve been hacked.

Prevent Identity Theft With These 11 Essential Steps

FTC to Crack Down on Sites That Claim Your Data Is 'Anonymized' When It's Not

Microsoft Flip-Flops on Blocking Office Macros by Default

US: North Korean Hackers Targeting Health Providers With 'Maui' Ransomware

PCMag Tests the Best VPNs

TOP TECH DEALS
Want more deals like these delivered to your inbox?
GET OUR BEST DEALS TODAY
Prime Day Deals LIVE Up to 60% off Amazon Devices, Over 100 Deals of the Day & More
 See All Deals  
GET DEAL

5TB WD_Black P10 Game Drive External Portable USB 3.0 Hard Drive (Compatible with PS4, Xbox One, PC/Mac)
$149.99 $99.99  
GET DEAL

New Apple AirPods Pro w/ MagSafe Charging Case
$249.00 $169.99  
GET DEAL

DJI Mini 2 4K Quadcopter Drone (Fly More Combo Kit)
$599.00 $479.00  
GET DEAL

All product and deal information such as discount, price and availability are believed to be accurate as of the time of publication. Please verify these details with the merchant site and check the merchant's terms and conditions before you buy. Publisher is not responsible for errors or omissions.
SHARE & FOLLOW US


Comments

Popular posts from this blog

The Cyberwire Daily Briefing

BleepingComputer.com

SecurityWeek Briefing