Mobile device security

CA CS CIMA Prakash Somani (Landmark Group) (23502 Points)

31 October 2012  

Mobile Device Security

Any device that you use for work purposes must be secured. However, mobile devices are especially susceptible to theft and attack. Watch this short video, and continue reading for more information.

 

Please enable Flash if you do not see the video.

Look around your desk...

Empty your pockets...

Look in your workbag...

How many mobile devices do you have?

Consider your personally owned devices as well. Now look at what you do with those devices. Which ones have you used to check your University mail? Your calendar? What about any systems or services that you may support through mobile devices? What applications have you installed? Your mobile device is really just a small computer. So if you need to secure your workstation, you also need to lock down your mobile device.

Mobile devices are vulnerable to the same risks as your traditional workstations. However, the attacks are somewhat different. These attacks include SMS exploits and phishing.

Here are some steps to make sure that your phone - and everything that's on it - stays safe:

Lock your mobile device when you're not using it.

  • Be sure to use a strong and unique passcode or pattern sequence.
  • Theft is a huge threat for mobile devices. If your unlocked phone is stolen, your personal information is gone with it.
  • According to research done by Symantec, most smartphone users have not set a password lock on their phones when they turn them on or wake them from sleep mode. This widespread lack of security makes any mobile device a tempting target for thieves or nosy neighbors.
  • Need instructions? Each device and operating system is unique. Search the web for your phone model or operating system along with "set password" or similar text, and follow the instructions from reputable search results.

Keep your device up to date.

  • That includes both the operating system and the apps running on your device.
  • Updating may require effort on your part to check for and download these updates.
  • Updates often provide enhancements to prevent malicious attacks.

Research an app before installing it.

  • Only use trusted sources for purchasing and downloading apps.
  • Only download applications that you need.
  • Applications sometimes contain viruses or malware that can steal any important information on the phone. Even the official app stores sometimes offer malicious apps that slip through their screening process.