We have witnessed that mobile devices have assumed the primacy over traditional forms of communication via PC or landline. The fact is that mobile devices are selling much better today than PC workstations. When I talk about mobile, we mean primarily smartphones, tablets, and laptops. These devices are the weakest link in security, so I decided to dedicate this post to them.
What can I find on my mobile device?
Modern business communication is almost impossible to imagine without mobile devices. The mobile phone can also be used as an accessory for identity verification, as a wallet for mobile payments, a means of location and navigation, access to various location-based services with the help of the GPS system built into it.
The device itself may include:
– Call detail
– Calendar with events
– SMS / MMS
– Pictures, audios, and videos
– Internet History
– Documents downloaded from the Internet
– GPS locations
How to protect your mobile device?
Here are some tips you can apply to your devices:
– Be sure to activate the option to request a PIN every time your phone is turned on, thus preventing anyone from turning on the device without any extra effort
– Activate the automatic keylock after a certain amount of time, which is very useful if you are in a public place and leave the phone on the charger out of your reach
– Set an option to remotely wipe the entire contents of your phone (remote wipe) that will allow you to destroy important data on your device if you lose your phone or have it stolen.
– Encrypt data on additional cards on the phone, but also in the main memory of the device itself, enable encryption of the entire device Full Device Encryption (FDE)
– Select applications carefully during installation and install them only from verified sources or the official market
– Install the latest operating system and application updates, so you always have the latest security updates.
– Install antivirus software on your phone, many users do not have this kind of application on their phone or tablet which is a big mistake
– Turn off Bluetooth, NFC, and WiFi connectivity when not in use or when you do not need them
– You regularly back up important data from your mobile phone so that if you lose it or something happens to the device itself, all the damage that can happen is to be left without the device itself, while the data can be easily migrated to another device.
– If the device you have supports a biometric authentication method such as fingerprint or iris reading, be sure to include such methods, even though there are gaps, they are still an additional measure of protection
– Never use unchecked chargers for the device as it may happen that by plugging the device into such a charger, the device will automatically become infected with some malware previously prepared.
– Last but not least, be sure to turn on phone sync with Gmail if it’s an android or other iPhone mail account to sync your contacts list and more so if you happen to have a problem with the device itself, you’ll save your contacts
This is a shortlist of things you can do to keep your device as safe as possible. Of course, you can never predict what can happen to the devices themselves, so let’s then take care of the data itself on the device. I hope that in this post I have been able to at least make a little difference to the fact that you apply at least some if not all of the presented protection measures and that in the future we will be at least a little safer.