{"id":129,"date":"2011-01-21T12:35:20","date_gmt":"2011-01-21T12:35:20","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=129"},"modified":"2011-01-21T12:35:20","modified_gmt":"2011-01-21T12:35:20","slug":"10-ways-to-protect-your-smartphone","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2011\/01\/10-ways-to-protect-your-smartphone\/","title":{"rendered":"10 ways to protect your smartphone"},"content":{"rendered":"
For those of us who own a smartphone, we often do not realise how much personal and sensitive information it contains about our lives. Although we might no longer be able to imagine a world without our Blackberry, iPhone, or Android device, we might not be taking the necessary steps to safeguard it\u2026<\/em><\/p>\n As we become ever more reliant on mobile phones in our personal and professional lives, smartphones, such as Blackberrys, iPhones, and those using the Android platform, are being increasingly subject to hacking and a broad range of other threats.\u00a0 To some extent we give little thought to how secure the information we store on our phone is, unless it is stolen or has been compromised in some way. Discussed below are some ways you can better protect your smartphone and its contents.<\/p>\n 1.\u00a0 Activate PIN.<\/strong> Although the capability to lock mobile phones is a standard feature on most devices, it is seldom used. The PIN, which is usually four digits long, can be the first line of protection from unauthorised access, especially if the device is lost or stolen. However, since there are ways to quickly crack such a short code, it should be supplemented by other measures.<\/p>\n 2.\u00a0 Be wary of unsolicited messages, emails and dodgy web links.<\/strong> Mobile phones are increasingly being subject to unsolicited text messages, which could be spam or phishing. Smartphones are also at risk from corrupt email attachments and suspicious web links, similar to PCs. Hence, the discrimination that is exercised to manage emails and connect to websites on a PC, must be applied when using smartphones.<\/p>\n 3.\u00a0 Turn off Bluetooth when not in use.<\/strong> Active Bluetooth connectivity can leave smartphones open to spying, to receiving unsolicited messages and even to hacking.\u00a0 Phones are especially vulnerable to Bluetooth attacks when a PIN has not been activated. Although it is a standard feature on most phones, it is advisable to turn it off when is not required. Further, turning off Bluetooth can result in another distinct benefit: it can significantly extend battery life on some phones.<\/strong><\/p>\n 4.\u00a0 Limit activity on unsecured Wi-Fi. <\/strong>Public or unsecured Wi-Fi, while attractive to mobile users, can provide an ideal environment for hacking. Moreover, cyber criminals are establishing fake Wi-Fi hotspots for that purpose. Instead of Wi-Fi, smartphone users on the go are encouraged to use their 3G or 4G mobile connection, which is more secure.<\/p>\n 5.\u00a0 Download apps from reputable sources.<\/strong> It is truly mind boggling the multitude of mobile applications that are available. They stem from a variety of sources, to suit every possible need, and there is still a lot of giddy enthusiasm in the industry to develop even more programmes. This array of choices often overshadows the real threat that exists from dodgy applications that can corrupt or transmit information from your smartphone to other sources. Moreover, many of us are at pains not to pay for applications if a seemingly similar programme is available for free. Although there might be safe, free applications available, greater attention should be paid to the source and to the host site to determine whether applications have been tested and verified.<\/p>\n 6.\u00a0 Back up phone data.<\/strong> It should be an established and regular practice to back up critical information on all computing devices \u2013 including smartphones. The requirements and procedure to back up a smartphone would be dependent on the platform and model. Instructions are usually provided either in the user manual or on the manufacturer\u2019s website. <\/strong><\/p>\n It is critical to note that backing up your data can allow viruses and other threats that are on your phone to be transferred to your PC, thus threatening the security of that device as well. Hence vigilance must be exercised to limit the susceptibility of all of your computing devices to viruses, hackers and other threats, and that they do not infect and re-infect each other.<\/strong><\/p>\n 7.\u00a0 Encrypt or password-protect phone\u2019s data.<\/strong> Although transmissions between your smartphone and your company\u2019s server might be encrypted, the data on device is not. The phone is especially vulnerable when it is physically connected to another device, such as a PC, and a direct download is attempted. Some devices have built-in features to encrypt or otherwise protect the stored data, with access being allowed on successful entry of a password. If this capability is not available on your smartphone, a third party programme can used to provide this feature.<\/strong><\/p>\n 8.\u00a0 Enable remote clear of data.<\/strong> Depending on the platform, most smartphones could either be programmed to erase its contents after a number of failed attempts to access or to erase when instructed by remote command. For the latter, it is critical to note that the device must be on in order to receive that instruction. If this feature is not available on your particular platform, again it can be secured separately as a third party application or as part of a mobile security software package.<\/strong><\/p>\n 9.\u00a0 Invest in tracking software.<\/strong> Theft of mobile devices, especially smartphones has reached epidemic proportions in most parts of the world. However, it is almost equally likely for owners to lose their phones.\u00a0 For a fee, some platforms, service providers, along with third party applications offer owners the ability to track down their smartphones. Depending on the features associated with that capability it might be possible to back up and\/or remotely erase the stored data through that programme.<\/strong><\/p>\n 10.\u00a0 Invest in mobile security software.<\/strong> All of the major platforms have some built-in security features that provide an excellent starting point for protecting your smartphone. However, depending on how valuable the device is to your personal and\/or professional life, it might be prudent to invest in additional software protection to secure the device and your information. Some of the features that mobile security software can provide are:<\/p>\n Although implementing just one of the above suggestions would improve the security of your smartphone, better results will be achieved if a more comprehensive approach is employed. Depending on the actual device, some security features are already built in, but at the very least need to be activated. The key is to recognise that the security of your smartphone is your responsibility, and to the extent you can, do something about it<\/em><\/strong>.<\/p>\n ____________<\/p>\n","protected":false},"excerpt":{"rendered":" For those of us who own a smartphone, we often do not realise how much personal and sensitive information it contains about our lives. Although we might no longer be able to imagine a world without our Blackberry, iPhone, or Android device, we might not be taking the necessary steps to safeguard it\u2026<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[27,33,19],"tags":[38,39,37],"class_list":["post-129","post","type-post","status-publish","format-standard","hentry","category-computing","category-lists","category-mobile-telecoms-2","tag-data-protection","tag-equipment-security","tag-smartphones","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-25","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":10,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/129\/revisions"}],"predecessor-version":[{"id":139,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/129\/revisions\/139"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n