Mobile Security Best Practices
With the
rapid proliferation of mobile devices not slowing down, malware infections are
on the rise, growing 163% in 2012. Just like the golden days of the internet,
hackers are more than happy to take advantage of this vast new crop of
unprotected devices.
But it’s not
only hackers we need to guard against. We need to make sure other scenarios are
covered, such as: What happens when my phone is lost or stolen? Or, How do I
prevent a data breach? And, How can I manage all this stuff? So with all this in mind, let’s go down the
list:
Authentication
How many of us just slide a finger to the right to unlock our devices? I’m betting more than half. Whether you choose a secure pattern, a pin or password, your fingerprint, or your face, make sure you are the only person who can get past your lock screen. This is the first line of defense when your phone ends up in someone else’s hands.
When a
device is lost or stolen, swift action is a must. Sure, using GPS to track down
a thief is enticing, but the main focus should be to keep data secure by
locking and/or wiping. Apple iPhone lets you use iCloud & Android
uses the Google Sync for remote wiping. There are plenty of good stand-alone apps that do a great job with this too.
Bluetooth & NFC
Turn them
off. Unless using a headset or sharing a photo with a friend, these tools are
open doors into your devices. Both are hackable with the right tools, and can
present real security risks. Viruses
have been found that spread from phone to phone via Bluetooth. So, keep them
disabled when not in use, and if your device supports hidden mode, use that
too.
We’ve
only skimmed the surface here, but the criteria covered above should serve as a
solid starting point to develop a secured mobile device or tablet.
No comments:
Post a Comment