Mobile Devices
Mobile Security refers to security of personal and business-related information stored on mobile devices such as smartphones and tablets. These mobile devices are targets for attacks because a lot of people leave them on all the time, unlike regular computers.
Quick Tips
Attackers attempt to exploit the weaknesses of mobile devices by taking advantage of Multimedia Messaging Services (MMS); Short Message Services (SMS), otherwise known as text messaging; Bluetooth; and Wi-Fi networks.
Here are some quick tips:
- Keep operating systems and applications current
- Install antivirus on your device(s) and keep it current
- Only install trusted applications from your application marketplace or store
- Turn off Wi-Fi and Bluetooth when not in use
- Secure your phone with a strong password
- Turn on airplane mode (or turn off the device) when you don't need any network connections
- Turn off GPS for apps when you don't need it
- Disable Geo-tagging, unless you really want anyone who will ever view your picture electronically to know exactly where it was taken
- Avoid public Wi-Fi connections
- Turn on or enable a device tracking application such as Find My Phone
- Back up your data to a secured location
- Enable device data encryption
- Use cell phone networks or secure wireless hotspots instead of unsecured or public Wi-Fi networks
- Do not bypass your device's security features (called "rooting" or "jail breaking") unless research requires this
- When in doubt, don't respond to unknown texting, calling, and voicemails. Just like email, these means of communicating can be hosts to scams
- Before selling or giving away your mobile device, back it up and erase all the content and settings
For more information on protecting mobile devices, check out the Stay Safe Online Mobile Device site. Be sure to check out the Stay Safe Online Mobile Parental Guide as well, for those of us that purchased mobile devices for our children.
Many thanks to the University of Georgia's Office of Information Security department for allowing us to use their image concepts for our campaign to help combat cybercrime. It is this type of shared governance and shared responsibility that will hopefully slow down the attackers and create a safer environment for us all.