Google Analytics

Sunday, April 19, 2015

What You Need to Know About Mobile Security.

Our Mobile Life



Mobile devices have become an integrated and important part of many of our lives today and that will likely increase rather than decrease. What we do with our devices, where we do it, and how we do it can put our privacy or security at risk. A few simple rules can greatly diminish the chance of you becoming a victim to the all too common cyber attack today.



First, make sure that your device is locked with a pass code, or even better, a biologic input like a finger print scanner. This will not completely secure the device but will slow someone down if they find it or steal it. Also make sure that you have a remote wipe program installed. This will allow you to remove your data or at least make it more difficult to recover if you lose the device.

Second, when we talk about installing apps on the device consider these things. The more apps you have on the device the more areas you are creating for vulnerabilities open to attack. Only install apps that you really need, and if you have apps that you have stopped using remove them. In security this is called reducing your vulnerability foot print. Another rule for apps is to only download apps from trusted vendors. Generally stick to the app stores for your product. This is not a sure fire way of protecting yourself but these vendors do conduct some control measures to evaluate if an app has a vulnerability or malware. Also if you are using an android device be aware of what the app is asking to have access to. For example a flashlight app should not need your location or contacts.

Third, be careful of using your device's Wi-Fi and Bluetooth functions. Operating your device on an unsecure Wi-Fi can give access to potential criminals that are in the area. Leaving your device's Bluetooth on can also create an open door for hackers to access your device. Only use your Wi-Fi and Bluetooth on trusted networks, and when you are not using these functions, shut them off. This can be an inconvenience sometimes but consider it the same as locking your car when you leave it.
  
The last rule is don't keep highly sensitive data on your device. This would mean not keeping a list of passwords, bank account information, employee identification, or social security numbers. If it is necessary to have sensitive information on the device, it should be encrypted.

These devices allow us to improve our lives in great ways, but we just need to use them with some awareness and responsibility.    

No comments:

Post a Comment