01604 926100


Ultrafast Connectivity · Secure Analytics · Smart Energy
Rugged Technologies · Outdoor Wireless · Fibreglass Technology · Secure Data Storage · Consultancy

What’s Your Back Up Strategy?

I got caught out recently ...


Posted by Pritesh Ganatra on 11/06/2024 @ 8:00AM

Here is the irony of the situation. It was inevitable that it would happen one day; that I would be caught out on the very thing I always preach to my clients. In two words: data backup ...

I had to use my friend's phone to try and lock my own stolen phone!

I had to use my friend's phone to try and lock my own stolen phone!

created by yourai using chat gpt and dall-e

This story relates only to my personal data as I had not got around to properly setting up the backup. I did not have sufficient storage in my generic data centre cloud backup account to store the data that was on my handset, including photographs that I had on my phone for the past few years.

"For only the second time since I have had a mobile phone
contract in 1996, I had my phone stolen!"

It was on my birthday this year, in May 2024. The main difference is that we are now in a very precarious position of having vast amounts of both personal and company data on our handsets so security is of the upmost importance along with having the correct backup facilities in place.

Looking from a corporate perspective, companies need to seriously adopt email security and more importantly, Mobile Device Management (MDM) which is the business solution equivalent to Apple and Google's 'find my phone' and 'wipe my phone' facilities that both Operating System vendors offer on their platforms.

These facilities are all well and good for personal phones and data, but nowhere near as efficient if you have a fleet of handsets, including any tablet devices that also have company emails and documents stored on the device for work purposes.

MDM offers not just search and wipe facilities, but a whole host of corporate features like bulk app delivery and updating of firmware as well as geofencing facilities and blocking of apps withing certain times of the day (for example, the user cannot access Facebook from 9.00am to 5.30pm).

When considering IT strategies, it is time to consider the whole picture in terms of 'technology' strategies and treat the entire network as being vulnerable at the network core!

All roads lead to your internet connections via wired and Wi-Fi connectivity which connects all internal devices to the external world and also to your backup systems. Apple and Google have tried their best to ensure your chosen apps can be reinstated on a new handset. But some of the protocols for locking a lost or stolen phone and using a standard web browser to access your account is nigh on impossible, as their standard approach is to verify the account by sending a code to the phone, which is as useful as a chocolate teapot!

When it comes to your technology strategies, backing up and keeping data from mobile phones and tablet devices inside the organisation should be part of the workflow as much as any PC or laptop security configuration.

Until next time ...



Would you like to know more?

Did you know, you can negotiate an all-encompassing contract to cover MDM, email security and anti-virus for a single discounted price? Give me a call on 01604 926100 or take a look at my website which you can find by clicking here.

Share the blog love ...

Google AMP  /  Précis  

Share this to FacebookShare this to TwitterShare this to LinkedInShare this to PinterestShare this via Buffer

#TechnologyProblemSolver #Communications #IT #Consultancy #Northampton #UK

About Pritesh Ganatra ...


The word 'Technology' has too many connotations in today's world!

Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT).

Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.

BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.

I am your technology problem solver and I look forward to helping you.


01604 926100