Your mobile devices – including smartphones, laptops and tablets – are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family.
It’s important to use your mobile device safely. Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
Keep software updated. Running the most recent versions of your mobile operating system, security software, apps and Web browsers is among the best defenses against malware, viruses and other online threats.
► PERSONAL INFORMATION IS LIKE MONEY. VALUE IT. PROTECT IT.
♦ Secure your devices: Use strong passwords / pass-phrases or touch ID features to lock your devices. These security measures can help protect your information if your devices are lost or stolen and keep prying eyes out.
♦ Think before you app: Information about you, such as the games you like to play, your contacts list, where you shop and your location, has value – just like money. Be thoughtful about who gets that information and how it’s collected through apps.
♦ Now you see me, now you don’t: Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Disable WiFi and Bluetooth when not in use.
♦ Get savvy about WiFi hotspots: Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your mobile device while you are connected.
Limit what you do on public WiFi and avoid logging in to key accounts like email and financial services on these networks. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection on the go.
► KEEP A CLEAN MACHINE
♦ Keep your mobile devices and apps up to date: Your mobile devices are just as vulnerable as your PC or laptop. Having the most up-to-date security software, web browser, operating system and apps is the best defense against viruses, malware and other online threats.
♦ Delete when done: Many people download apps for specific purposes, such as planning a vacation, and no longer need them afterwards, or we may have previously downloaded apps that are no longer useful or interesting to us. It’s a good security practice to delete all apps you no longer use.
♦ Keep your device secure by using a strong password to lock your smartphone or tablet. Enable two-step authentication when offered, and change passwords to any accounts you accessed while connected to an unfamiliar network.
♦ Before downloading an application (app), make sure you understand what information (i.e., location, your contacts, social networking profiles, etc.) the app would access and share before you download it. Download apps from trusted sources.
♦ Back up your contacts, photos, videos and other mobile device data with another device or cloud service on a weekly basis.
♦ When using a public or unsecured wireless connection, avoid using sites and apps that require personal information like log-ins.
♦ Delete any online communications (i.e., texts, emails, social media posts) that look suspicious, even if you think you know the source.
♦ When banking or shopping online, use only trusted apps or websites that begin with https://
♦ The Golden Rule. Be respectful on your device. Treat others as you would like to be treated when texting, calling or using social networks.
♦ Share with care. Be a true friend when taking and sharing photos and videos with your smartphone. Get permission from friends before you share them via text or social networks.
♦ Be Web wise. Stay informed of the latest updates to your device and apps. Know what to do if something goes wrong.
♦ Becher, Michael (2009). Security of Smartphones at the Dawn of Their Ubiquitousness (PDF) (Dissertation). Mannheim University.
♦ Becher, Michael; Freiling, Felix C.; Hoffmann, Johannes; Holz, Thorsten; Uellenbeck, Sebastian; Wolf, Christopher (May 2011). Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices (PDF). 2011 IEEE Symposium on Security and Privacy. pp. 96–111. doi:10.1109/SP.2011.29. ISBN 978-1-4577-0147-4.
♦ Bilton, Nick (26 July 2010). “Hackers With Enigmatic Motives Vex Companies”. The New York Times. p. 5.
♦ Cai, Fangda; Chen, Hao; Wu, Yuanyi; Zhang, Yuan (2015). AppCracker: Widespread Vulnerabilities in Userand Session Authentication in Mobile Apps (PDF) (Dissertation). University of California, Davis.
♦ Crussell, Johnathan; Gibler, Clint; Chen, Hao (2012). Attack of the Clones: Detecting Cloned Applications on Android Markets (PDF) (Dissertation). University of California, Davis.
♦ Guo, Chuanxiong; Wang, Helen; Zhu, Wenwu (November 2004). Smart-Phone Attacks and Defenses (PDF). ACM SIGCOMM HotNets. Association for Computing Machinery, Inc. Retrieved March 31, 2012.
♦ Halbronn, Cedric; Sigwald, John (2010). Vulnerabilities & iPhone Security Model (PDF). HITB SecConf 2010.
♦ Hogben, Giles; Dekker, Marnix (December 2010). “Smartphones: Information security Risks, Opportunities and Recommendations for users”. ENISA.
♦ Jøsang, Audun; Miralabé, Laurent; Dallot, Léonard (2015). It’s not a bug, it’s a feature: 25 years of mobile network insecurity (PDF). European Conference on Cyber Warfare and Security (ECCWS 2015).
Anti-Virus / Anti-Malware Solutions: