Mobile Phone Security (2)


Technology has become, not only our means of communications verbally: but now it has become the life line that keeps our schedules, important dates, and important information. What is more important is keeping this information safe from hackers. Like all things, they should be used responsibly. In order to keep your information safe, and your family safe, take these precautions. Do your research on a device that you are looking into buying. Seven ways you can keep your information safe while using your device.
1. Enable Encryption: on every device you own make sure the Encryption is turned on, and use the security controls. A lot of times this step is not taken serious enough.
2. Use Authentication. This is your own personal password for your device. Remember to use a phrase, numbers upper case letters. Also important to make sure it is a different password from all other websites, or devices.
3. Choose your 3rd party applications: Control any 3rd party apps. Apps are one way you can allow hackers into your device. Be careful, make sure you read all the information before adding, including the providers privacy policy. If privacy policy is unclear or non existent for an application, either do not install this application or provide minimum required permissions (below) to this application.
4. 3rd party applications permissions: Be very selective is providing minimum required access to third party applications. Access to your contacts, you location, calendars, photos and many other sensitive data can be selectively provided to your application. Make sure you provide what is most needed and disable any access that you provided unintentionally or for temporary purposes. It is not a bad idea to review your applications and delete/uninstall applications that you needed for a short time (such a conference application or a hotel application that you used while overseas).
5. Keep a clean device: Regularly clean your browser cache, cookies, session data and also regularly remove applications, files, certificates that are stored on your device. This will be a good way to get rid of information that is on your device that can possibly be misused or abused by either software or by someone who physically manages to steal your device.
6. Backups and testing your backups: Backup your phone and mobile device with a reliable software and test your backups for a safe restore. If you see any strange behavior with your mobile device, attempt to rollback to the best backup you have and thus test your backup for reliable restoration.
7. Lost Cell Phone service: If your provider has an option for “Lost Cell Phone” service, choose this plan. Be well aware of the procedure for reporting your lost cell phone. If you loose your cell phone while traveling international, ensure you either have “Remote / Self Wipe” capability or the ability to lock down your device in case it is reported lost of stolen. Many service providers and device providers have their own software / plans for this type of service.
Mobile devices are not a bad thing to have. They help up schedule our days, keep important dates, and get information faster to employees. But like anything else, they should be used responsibly.

PSMail Quicktips: Mobile technology has become far more than just a convenient way to talk with one another: it has become our most indispensible tool. With it we organize our schedules, store our entertainment, manage our finances, connect with our social network, and…well, nearly everything we do can have some connection to mobile technology.

Which is all the more reason to be concerned about hackers and other nefarious threats. Here are seven way you can keep your information safe while using your device.

Continue reading Mobile Phone Security (2)

Mobile Phone Security

PSMail Quicktips: The increasingly mobile nature of our day-to-day communications raises new challenges to security. Here are some tips for keeping your mobile phone secure:

1. Don’t install any free software or code onto your phone without reviewing it carefully. Lots of free software contains malicious code that can install malware on your SIM card and be used to intercept data and voice calls.

Continue reading Mobile Phone Security