Our
Mobile Life
Mobile devices have become an integrated and important part of many of our lives today and that will likely increase rather than decrease. What we do with our devices, where we do it, and how we do it can put our privacy or security at risk. A few simple rules can greatly diminish the chance of you becoming a victim to the all too common cyber attack today.
First, make sure that your device is locked with a pass code, or even better, a biologic input like a finger print scanner. This will not
completely secure the device but will slow someone down if they find it or steal
it. Also make sure that you have a remote wipe program installed. This will
allow you to remove your data or at least make it more difficult to recover if
you lose the device.
Second, when we talk
about installing apps on the device consider these things. The more apps you
have on the device the more areas you are creating for vulnerabilities open to attack. Only install apps that you really need, and if you have apps that you
have stopped using remove them. In security this is called reducing your
vulnerability foot print. Another rule for apps is to only download apps from
trusted vendors. Generally stick to the app stores for your product. This is
not a sure fire way of protecting yourself but these vendors do conduct some
control measures to evaluate if an app has a vulnerability or malware. Also if
you are using an android device be aware of what the app is asking to have
access to. For example a flashlight app should not need your location or contacts.
Third, be careful of using your device's Wi-Fi and
Bluetooth functions. Operating your device on an unsecure Wi-Fi can give access
to potential criminals that are in the area. Leaving your device's Bluetooth on
can also create an open door for hackers to access your device. Only use your
Wi-Fi and Bluetooth on trusted networks, and when you are not using these
functions, shut them off. This can be an inconvenience sometimes but consider it the same as locking your car when you leave it.
The last rule is don't keep highly sensitive data on your
device. This would mean not keeping a list of passwords, bank account
information, employee identification, or social security numbers. If it is
necessary to have sensitive information on the device, it should be encrypted.
These devices allow us to improve our lives in great ways, but we
just need to use them with some awareness and responsibility.
No comments:
Post a Comment