Legal Technologies unveil 5 things stored on work devices

Legal Technologies unveil 5 things stored on work devices

Legal Technologies – the corporate forensic investigation and e-disclosure firm, unveils the top five things employees have stored on their smartphones, revealing the dark side of Bring Your Own Device (BYOD).

Proven Legal Technologies’ exercise involved the purchase of four random smartphones from eBay – each from different sellers around the United Kingdom. The content was forensically analysed, revealing a surprising amount of information about previous use, including detectable company data that has previously been ‘wiped’ by their owners.

Using personal devices for corporate activity can increase flexibility and efficiency, but Proven Legal Technologies’ research found that employees are storing confidential company information on their smartphones, which poses a serious security threat to businesses.

The top five items detected on ‘wiped’ devices include:

Documents and files
Between the four smartphones analysed, 1,531 deleted files and documents were recovered, many of which were confidential business records and valuable intellectual property.

Messages and calls
With 1391 calls, 442 SMS, and 438 emails tracked and stored, any fraudster that uncovered the discarded devices would have access to corporate communications and details. With most businesses unaware of what employees send and store on their phones, they will not know what has been passed on with discarded devices.

Contact details
54 deleted contact details were located on the smartphones, with a further 10 that had not even been wiped. With some criminals using phone numbers and email addresses to target victims, careless employees could be putting their colleagues and company at risk.

Private information
The previous owners of the four analysed phones unknowingly made their web searches and location data accessible, with 351 search histories stored, and 525 instances of deleted location recovered.

Images
33,535 images were found on the second-hand devices. Individuals could put themselves in danger by storing personal images on their mobiles, and pose serious threats to their company’s reputation by releasing indecent shots into unknown hands – 66% of the pictures recovered had not even been deleted.

Phil Beckett, partner at Proven Legal Technologies, comments:

“Companies – and individuals – must be aware that pressing delete is simply not enough. Businesses of all sizes are vulnerable to confidential data loss, and given the vast amount of information housed on corporate devices these days, this could result in some very serious problems.

“Our research shows that even smartphones that have previously been ‘wiped’ are still at risk from detection. This should act as a call to action for businesses to take precautions around BYOD schemes, and keep a close eye on where confidential is being stored and sent – educating themselves, and employees, of the dangers.”

[su_button url=”http://provenlegal.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]Find out more about Proven Legal Technologies[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Defensive AI safeguards against cyber threats

Defense Initiative to enhance global cybersecurity underscores the importance of defending against increasingly sophisticated and pervasive cyber threats…

Bridewell in Microsoft Security Copilot Partner Private Preview

Bridewell today announced its participation in the Microsoft Security Copilot Partner Private Preview. Bridewell was selected based…
Veeam

Mediclinic Middle East Partners with Veeam

Veeam Software announced it was selected by Mediclinic Middle East to modernize its business-continuity facilities and enhance…

Evanssion and ThreatQuotient Join Forces

A renowned cybersecurity and cloud-native security VAD in the Middle East, Evanssion, has just announced a strategic

Most cyber attacks in Middle East involve spyware

Positive Technologies has analysed the attacks carried out on individuals in Middle Eastern countries between 2022…
Neustar

New DNS detection from Neustar

Neustar Security Services, a provider of cloud-based security services that enable global businesses to thrive online, is introducing UltraDDR…
Acronis

Acronis seals partnership with Fulham FC

Acronis, a global cyber protection company, has announced a three-year partnership with London´s oldest professional football club, Fulham FC…
Acronis

Acronis Cyber Foundation celebrates five years

Acronis is proud to celebrate the fifth anniversary of the Acronis Cyber Foundation Programme, a set of philanthropic initiatives designed to engage…
Scroll to Top