Quantcast
Viewing latest article 1
Browse Latest Browse All 8

Eight Steps to Secure Mobile Phones & Tablets

By Scott AurnouImage may be NSFW.
Clik here to view.
Locked Smartphone

While threats to smartphones and tablets are only increasing as hackers and cyber criminals get more creative, taking a few basic (and relatively easy) steps will go a long way towards securing your device. Here are eight suggestions:

1) Don’t jailbreak or root your phone or tablet. ‘Jailbreaking’ or ‘rooting’ a mobile device refers to overriding the manufacturer’s settings – including disabling the device’s security settings and future updates – to allow it to download and use apps and other features that are normally not enabled on the device (‘jailbreaking’ refers to the process as it applies to an Apple iPhone, iPod Touch or iPad and ‘rooting’ is much the same for a smartphone or tablet running the Android mobile operating system). The vast majority of mobile malware affects these devices since their security systems are badly compromised by the jailbreaking or rooting process and they should never be connected to a business computer network.

2) Update your software. Updates to your mobile operating system and any apps on your smartphone or tablet often include security fixes and should be downloaded as soon as they’re available. There are notable differences between the various mobile operating systems and their updating procedures and it’s a good idea to be familiar with them so you know what to expect.

3) Always set a passcode/password. A passcode is a four digit PIN code required to use the device. Without one, anyone holding your device can access everything on it by simply turning it on. For extra protection, nearly all devices offer the option to use a longer alphanumeric password instead.

4) Back up your data. Backing up the data on your smartphone or tablet is fairly easy and it’s the kind of thing you’ll REALLY wish you’d done if your device gets lost, stolen, or just stops working. Backing up can be done by syncing your device to your computer, a work network or online (i.e., through ‘the cloud’).

5) Enable remote wiping on your device. In case of loss or theft, personal and business data can be protected from prying eyes. A remote wipe is like a ‘factory reset’- it erases all data on a smartphone or tablet. If the device has been backed up, the information can be restored on a replacement (or the original, if you get it back). A number of mobile security apps, as well as Apple’s iCloud service, can be configured to enable remote wiping. An automatic remote wipe can also be set after a number of incorrect attempts at guessing your passcode

6) Check app permissions (and read reviews). Why would a game need access to your address book? Whenever you download an app, it will request ‘permissions’ which will allow it to use different functions and data on your phone or tablet. It may seem be a little tedious, but you really need to check them before saying yes and downloading the app. Apps requesting unnecessary permissions are especially likely with free versions of normally paid apps and apps purchased from third party app stores. Avoiding either isn’t a bad idea. Also read reviews before downloading them – if there are just a few or a lot of bad ones, play it safe and don’t download the app.

7) Use mobile security software. While security apps won’t protect you from everything, they do offer helpful features, including device tracking apps and protection against some mobile malware. Among others, Lookout Mobile, Avast and Sophos offer good free versions of security apps. The Top Ten Reviews website reviews a number of the paid mobile security apps, including a breakdown of their features.

8) Think before you click. Many tainted websites – including the links in an email – are infected with mobile-specific malware that can be extra tricky to detect, since you can’t hover over the link (to see if it isn’t what it appears to be) with a mobile device. Your best defense against a number of electronic attacks against your mobile device is your common sense. If it doesn’t look quite right or sounds too good to be true, it probably is and your best move is to move on.

Of course, no system or protective measure is completely foolproof, but the steps outlined above will make your smartphone or tablet a much harder target for the proverbial bad guys.


Viewing latest article 1
Browse Latest Browse All 8

Trending Articles