Cyber Security Awareness - Mobile Devices

Mobile Devices

Mobile Security refers to security of personal and business-related information stored on mobile devices such as smartphones and tablets. These mobile devices are targets for attacks because a lot of people leave them on all the time, unlike regular computers.

Keep your mobile devices out of the wrong hands.

Quick Tips

Attackers attempt to exploit the weaknesses of mobile devices by taking advantage of Multimedia Messaging Services (MMS); Short Message Services (SMS), otherwise known as text messaging; Bluetooth; and Wi-Fi networks.

Here are some quick tips:

  • Keep operating systems and applications current
  • Install antivirus on your device(s) and keep it current
  • Only install trusted applications from your application marketplace or store
  • Turn off Wi-Fi and Bluetooth when not in use
  • Secure your phone with a strong password
  • Turn on airplane mode (or turn off the device) when you don't need any network connections
  • Turn off GPS for apps when you don't need it
  • Disable Geo-tagging, unless you really want anyone who will ever view your picture electronically to know exactly where it was taken
  • Avoid public Wi-Fi connections
  • Turn on or enable a device tracking application such as Find My Phone
  • Back up your data to a secured location
  • Enable device data encryption
  • Use cell phone networks or secure wireless hotspots instead of unsecured or public Wi-Fi networks
  • Do not bypass your device's security features (called "rooting" or "jail breaking") unless research requires this
  • When in doubt, don't respond to unknown texting, calling, and voicemails. Just like email, these means of communicating can be hosts to scams
  • Before selling or giving away your mobile device, back it up and erase all the content and settings

For more information on protecting mobile devices, check out the Stay Safe Online Mobile Device site. Be sure to check out the Stay Safe Online Mobile Parental Guide as well, for those of us that purchased mobile devices for our children.

Many thanks to the University of Georgia's Office of Information Security department for allowing us to use their image concepts for our campaign to help combat cybercrime. It is this type of shared governance and shared responsibility that will hopefully slow down the attackers and create a safer environment for us all.

Was this helpful?
100% helpful - 2 reviews
Print Article

Related Articles (4)

Identity Theft is defined as the fraudulent acquisition and use of an individual's personally identifying information, usually for financial gain. Key pieces of personally identifying information include such items as social security, insurance, or driver's license numbers. Thieves who steal such information may then use it to obtain credit, merchandise, or medical drugs and services, all in the name of the victim.
Malware is a general term for any software that can interrupt computer operations, gather sensitive information, or gain access to a system of computers. Malware may include computer viruses, worms, trojan horses, ransomware, spywear, adware, and scareware to name a few.
Always use a strong password to protect your computer, mobile device and online accounts. Select a strong password with a mix of upper and lower case letters, numbers and special characters.
Phishing attacks are attempts to collect sensitive information such as social security numbers, passwords, usernames, credit cards (and sometimes cash - usually in the form of a wire transfer) in the form of an electronic communication. When attackers get the victim to bite the bait then phishing succeeds.