Lost or stolen device assessment

With mobile devices becoming ever more prevalent, ensure you’re not introducing additional risk alongside improved mobility

When these devices are lost or stolen, it is vital that this doesn’t present a risk of data loss or unauthorised access to your network and data.

This service is a test to determine how much information can be gained from a lost device.

This ranges from almost nothing (which is unusual for laptops in particular) right up to all the information held locally, including details to achieve remote access to a company’s internal infrastructure.

What’s included in the assessment?

A lost or stolen device assessment is usually based on everything in a typical laptop bag, including all the information that would be found alongside the laptop.

The scope is something that can be discussed over a review call and tailored to each client’s requirements.

The best test is to simulate a real-world scenario, rather than to analyse a laptop that has been separated from its owner, had its post-it notes removed, notebooks retained and anything else which would aid an attacker is trying to gain access to the device, network and data.

Smartphones and tablets usually present less risk than a laptop if properly secured but we check that the right configurations are in place.

Analysis and exploitation

As the assessment commences, analysing the findings and attempts made, where safe and permitted, to exploit any vulnerabilities discovered.

If access is gained to the device, attempts may be made to access key systems on the internal network, over a VPN or any other discovered remote access gateway, using stored credentials.

Overview of the assessment

The following are assessed in this exercise:

  • Insecure storage or recording of passwords
  • Cached or unlocked credentials
  • Missing security patches
  • Boot process analysis
  • Device/disk encryption
  • Password brute force attack/weak password policies
  • Sensitive data disclosure
  • Information leakage
  • Local security policy circumvention
  • Multi-Factor Authentication (MFA)
  • Mobile Device Management (MDM)

Let’s make things happen

Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.

info@cognisys.co.uk
Leeds office

5 Park Place
Leeds
LS1 2RU

info@cognisys.co.uk
London office

131 Finsbury Pavement
London
EC2A 1NT

CONTACT OUR TEAM

Discover how we’ve helped leading organisations