My previous blog listed the 5 main Mobile security threats for 2013. In this blog I will provide you with 10 basic steps to assure your (new) smartphone or tablets meets the minimum security features. Some of these seem so simple and obvious, that I never paid attention them, makes sense right?! Some of the steps are human behaviour others relate to generic technical knowledge.
1. Secure it:
Many of us still don’t secure our devices, by not using a PIN or passcode. Simple, effective and at least
it protects you from anyone who gets hold of it to access and use it.
2. Create a Back Up:
Whether you lose your phone or it gets stolen we all know that
it feels like you lost the most important thing in your life. It happened to me
in Moscow. I had no backups and felt completely lost! Create a back up!
3. Note Your IMEI:
IMEI is your unique 15-digit number that identifies your
phone. You can find it beneath the battery or alongside a SIM card slot. The
number provides Law Enforcement Agencies and sites like EBay.com a way to
identify your phone (if it is put up for sale in an auction or brought into a Police station). The number will confirm your ownership! Note it down and store it somewhere safe too you!
4. Security software (Anti-Vius):
We all know and most of us use Anti-Virus. Additionally such
packages offer features like device tracking, remote lock and wipe, anti-phishing protection.
Interested? CLICKHERE to go to the 2013 Top 10 Mobile Security Software
review. Money well spend!!
5. Tracking:
Accurate to a number of metres, modern tracking software is
included in the best mobile security offerings, but is also built in to certain
mobile platforms. Windows Phone's 'Find My Phone' and iOS' 'Find My iPhone'
options should always be activated on devices. It uses tracking software using
the phone's built-in data connection. CLICK HERE for the TOP 10
TRACKING Mobile Software. Get Familiar with your phones' capabilities!
6. Verify Your Monthly Phone Bill:
Make sure you verify your monthly statement, due to certain
malware (read my
previous blog) that will make use of your device. If you spot it any
strange amounts on your statement immediately contact you service provider.
It might take you a bit of time, but will save you money!
7. Smart Surfing:
The most secure data connection you should use on a Mobile
Device is provided by your Mobile Provider. Free WIFI-Hot Spots are pose an
increased security risk, best is verify if the WIFI-Hotspot provides a secure
channel. Be Aware but not affraid!
8. Be Aware of specific threats:
Especially Andriod operated systems will be targeted in 2013
(as described in my
previous blog, boy it gets boring), but if you own a mobile device
operating on Windows or Apple's IOS the security risks are more or less the
same as with an Android operated Mobile Device!!! Try to follow the latest developments for instance on twitter or via newsletters from your security or mobile provider!
9. Check BYOD Policies
If you use your device at work, over a company network, or
for anything related to work, be sure to ask your IT department for any mobile
use policies. It might be that your employer requires some control of the work
data you have on your device, or may ask you to abide by certain
practices. BYOD is basically a two-way relationship: it provides the
employee and increased flexibility and mobility which benefits the employer. Verify how it impacts you as a user and how it impacts your employer or employees!
10. Treat your mobile device like
you wallet, mind it carefully!
Don't leave your device unattended whilst going to the bathroom or chatting to somebody at a conference!
The 10 basic security steps for a new (or already operating) Mobile Device are shockingly easy, but how many of the above boxes can you tick as "Done"?
Link to this post: http://mcommerce-explorer.blogspot.com/2013/03/10-basic-security-steps-for-smartphones.html#links