Tuesday, December 10, 2024

Smartphone Security: 10 Key Points

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Smartphone security is an increasing issue as hackers boost their efforts against devices that are are largely unprotected. Here are some helpful hints to protecting your smartphone.

When it comes to security issues, smartphone users are a bit delusional in believing the phone is safer than the PC. “If you can access data on your smartphone, so too can hackers,” warned Martin Hack, EVP of NCP engineering.

What can thieves get from your phone? Access to your mobile banking site complete with passwords and PINs; your email at work and at home; passwords and access to your employer’s networks; your social media accounts that contain all the info. an identity thief needs (and desperately wants); access to your PC when you sync your phone; and … much, much more.

Wake up call

It’s time to wake up and smell the sweaty hacker on your phone. Whether you are a CIO charged with securing the enterprise from employee cell phone use or just a guy or gal toting a loaded smartphone, Tim Armstrong, malware researcher at Kaspersky Lab, said there are several universal things that all smartphone users should and should not do:

The Do’s:

1. Lock your screen with a pin code or password. While this seems simple, anything that provides an extra layer of difficulty for an untrustworthy user is beneficial.

2. Install and enable remote services. All major smartphone operating systems (Blackberry, iOS, Android, Windows Mobile) can be enabled with some or all of these features: remote lock, remote wipe, and even GPS location (for finding where your phone went) are available in many cases. This goes hand in hand with No. 3.

3. Back up your data. Either through a product that offers this functionality, or simply by copying your documents, pictures and info to your computer. This can save you in the event of a lost, stolen, destroyed, or otherwise non-functioning phone.

Read the rest about Smartphone security at InternetNews.

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles