Nielsen reports “We are just at the beginning of a new wireless era where smartphones will become the standard device consumers will use to connect to friends, the internet and the world at large. The share of smartphones as a proportion of overall device sales has increased 29% for phone purchasers in the last six months; and 45% of respondents indicated that their next device will be a smartphone.â€
Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommend the following tips to help you protect yourself and to help keep the web a safer place for everyone.
You can protect yourself from cyber criminals by following the same safety rules you follow on your computer when using your smartphone. These rules include:
Access the Internet over a secure network: Only browse the web through your service provider’s network (e.g., 3G) or a secure Wi-Fi network.
Be suspicious of unknown links or requests sent through email or text message: Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.
Download only trusted applications: Download “apps†from trusted sources or marketplaces that have positive reviews and feedback.
Be vigilant about online security: Keep anti-virus and malware software up to date, use varying passwords, and never provide your personal or financial information without knowing who is asking and why they need it.
Don’t jailbreak an iPhone: Most of the infections that have plagued iPhone users occur when the phone is jailbroken. Jailbreaking is the process of removing the limitations imposed by Apple on devices running the iOS operating system. Jailbreaking allows users to gain full access (or root access) to the operating system, thereby unlocking all its features. Once jailbroken, iOS users are able to download additional applications, extensions and themes that are unavailable through the official Apple App Store.†Jailbroken phones are much more susceptible to viruses once users skirt Apples application vetting process that ensures virus free apps.
Robert Siciliano, personal security expert contributor to Just Ask Gemalto.
1 user commented in " 5 Security Considerations for a Mobile Phone "
Follow-up comment rss or Leave a TrackbackThese are great tips! As a Symantec employee focused on mobile device security and management, I might add a few more to the list:
– Both business- and personal-related information stored on mobile devices is often sensitive. Encrypting this data is a must. If a device is lost and the SIM card stolen, the thief will not be able to access the data if the proper encryption technology is loaded on the device.
– As important as it is to keep security software up-to-date, keeping the rest of the software on mobile devices updated cannot be ignored, either. Software vulnerabilities are a common method used by attackers to gain access to devices. The sophisticated operating systems used on modern smartphones are no exception. In fact, Symantec documented 163 vulnerabilities in mobile operating systems in 2010. Keeping this software updated with the latest releases from smartphone vendors can go a long way in preventing attackers from leveraging security flaws in the code.
– Be aware of your surroundings when accessing sensitive information. Whether entering passwords or viewing sensitive or confidential data, being cautious of who might be looking over your shoulder might seem a bit paranoid, but it’s surprising the lengths to which some enterprising criminals will go.
– In the case of a loss or theft of a mobile device, users should know what to do next. Processes to deactivate the device and protect its information from intrusion should all be in place. Many of the better security products on the market provide these capabilities.
Leave A Reply