This post represents the answer to the question we often put. In the beginning, I want to point out that when I say a mobile device I mean smartphones, tablets, now slightly forgotten PDAs (Personal Digital Assistant). These are all devices that are often with us and may happen to be lost or stolen by someone. When I say stealing, I think that stealing a device directly or what is often happening is a theft of a woman’s or men’s bag, because the device itself could be in it.
Security experts claim that there are only two categories of users:
- Those who have lost their device or steal them
- Those who will lose their device or they will be stolen
Nine essential things to consider
In this post, I want to list a list that end users can use to protect their data in the event of a loss or theft of the device.
– Full Device Encryption (FDE) is an option each smartphone has in its work environment, meaning that the data on the device itself will be encrypted and even if some devices are installed on your device to download data, it will not be able to download your data.
– Remote Wiping is an option that is extremely useful because it lets you start deleting from a remote location when your device is stolen. Then you can automatically start wiping data from it.
– Lockout is an option where you can set up after some unsuccessful logging on the phone to automatically start remote wiping (Remote Wiping)
– The Lock screen is the lock option for the device itself and this is one of the basic things that each user of the device needs to adjust. It is possible to set up several different variants, but the PIN is usually used as a string of numbers or patterns embedded in merging points on the screen in the predefined order. By some analyses of the security expert, a PIN is a much better solution because the screen can sketch the form of connection points that someone can reconstruct. Here I would like to point out that besides this, the biometrics in the form of fingerprint readings used by Apple and Samsung on their devices can also be used. It would also be good to set a short time as an automatic lock of the screen so that someone would not use it while you were out of that time before the device was locked.
– Biometry is a user checking method through some of the best technologies, but because of the cost, a fingerprint reader is still used. Another of the most recent techniques is heart rate readings that can be expected on mobile devices in the future as some already have a sensor that can register heartbeats.
– GPS (Global Position System) is something we use when we want to get there somewhere, so we can have some help to get to a particular destination through some of the navigation applications. However, from a security perspective, it is possible to determine in this way where your device is with a great deal of precision, which can be used in the event of a loss or theft of the device.
– Application control is a way to control which applications can be installed on your phone. This can be useful for official phones in companies as well as for parents who want to track what their children have on their device installed. Potentially suspicious apps that we never heard should not be installed even if they are on the list in the official Android and iPhone vendor because they may be used to steal data from the device and maybe some sort of spyware application.
– Removable storage of the cards we have in our device and serve to increase the amount of memory on the device itself as needed. In most cases, these are SD cards of different formats. Note that if your phone is an active FDE option that has been mentioned earlier in the text, then you must also encrypt the information on the card itself.
– Shutting down unnecessary functionality is a good measure for battery life and data security. In the event that you have WiFi, Bluetooth or NFC permanently on, it would be wise to turn them off because it is proven that they can be used to input or read data from your devices. We can say that it is the most vulnerable in Bluetooth technology and it is possible with Bluejacking attacks to get data on the device itself. Attack type Bluesnarfing is downloading data from the device, which implies all the data and even the phone book itself from the device.
These are just some of the more popular measures that can be easily used and adapted and do not require too much knowledge of the user. In this post, I wanted to encourage readers to start thinking and applying something of the above. To begin with, it will be enough to escape the dead point.