Smart Phone Security Practices to Follow

smart phone security

Lack of Smart Phone Security is one of the more overlooked ways hackers gain access to your data. Sure, platforms like Apple and Google tout “The most secure” title when they’re planning to put out a new product or OS update, but are they?

These days, smart phones are just as powerful as computers, and attacks on them are on the rise. In addition, they are convenient because you can do a plethora of tasks with them (checking email, browsing the internet and social media, mobile banking, etc.).  Unfortunately, once hacked, hackers are more than privy to this information. 

That is why businesses and consumers can no longer ignore it. Smart Phone Security needs to be addressed, and proper actions need to be implemented. Otherwise, like a hacked computer, the pain of dealing with it becomes unbearable once it happens. 

It is crucial to learn about phone security and mitigate the risk that cellphones carry as attackers turn to target them. This is the only way to protect your privacy, network login credentials, finances, and safety. Phone security comprises a collection of technologies, controls, policies, and best practices. 

The idea is to protect you from mobile security threats of all kinds. These threats exploit vulnerabilities in mobile software, hardware, and network connections to enable malicious, unauthorized activities on the target device. Once they infiltrate your device, they can steal your information and use it in many nefarious ways, such as botnets that attack other devices and much more. In addition, if you communicate with the office, they can get into your network and perform worse acts. Indeed, mobile phishing attacks, which use texts and emails to trick recipients into clicking on malicious URLs, are up 85% in the last year. 

The same precautions that are recommended for your PC’s are relevant for mobile devices as well:

  1. Keep your operating systems up to date. Apply all the latest updates available for your device.
  2. Do not fall for Phishing schemes to click on a link or download an attachment and provide sensitive information.
  3. Please do not download Apps unless it is from App Store or Google Play. They can open the door to the hacker’s world. Make sure your apps are updated regularly; otherwise, they can be exploited. Finally, do not give access to your phone or anything that can track you.
  4. Have a strong password (6 digit pin), set up face recognition and two-factor authentication.
  5. Be careful with unsecured Wi-fi. Hackers can easily access your device and steal your information.
  6. Do not leave your mobile phone unattended, and easy to steal. Once stolen, they can be jailbroken.  Then, the hacker or the thief has access to all your data. Set the phone to self-destruct after five failed password attempts.

If the mobile device belongs to the business, more stringent steps need to be taken:

  1. Have a mobile usage policy that clearly states the expectations and adheres to the best practices and compliance guidance.
  2. Segmentation of data and apps and setting up permissions and limitations to access specific company data.
  3. Install security software such as Microsoft Intune on mobile devices. The software has many protection levels and can be purchased as part of Office 365.
  4. Use VPN to communicate with the office. This will ensure the safety of both the mobile phone as well as network.
  5. Enable data Encryption; this feature is built-in to the phones nowadays.
  6. Remote wipe and tracking capabilities. Many apps are available for wipe and tracking, and many other features such as antivirus are available under Mobile Device management. Preyproject.com is one of them.

We have touched upon all the necessary steps to secure your mobile device. However, we cannot emphasize its importance because of the growth of the threats that we have noticed towards mobile devices.

If you have any questions, don’t hesitate to get in touch with us at 818-501-2281 or info@ceocomputers.com. We will be happy to provide you with a free consultation about protecting your data and sensitive information against cyber security threats. 

Posted in IT Blog