internet safety
Mobile Device Security
Per FTC regulations we are required to disclose that “As an Amazon Associate I earn from qualifying purchases” and other programs at no extra cost to you. Please refer to our Affiliate Disclosure for more information.
Users may use their mobile devices to access email, the internet, GPS navigation, and a variety of other applications. Mobile security, however, has not kept pace with conventional computer security. Firewalls, antivirus, and encryption are used less commonly on web applications such as well as mobile devices.
What is the risk?
• Loss or robbery of equipment. Losing a computer to fail or rob could result in a loss of productivity, loss of data and possible liability under data protection legislation.
• Critical data loss. There can be sensitivity or confidentiality of certain electronic devices such as personal and video images, e-mails, text messages and files.
• Network penetration unauthorized. Since several mobile devices offer a variety of network communication options, secure corporate networks may potentially be attacked.
• Data that has been intercepted or compromised. There are always concerns that sensitive data may be intercepted via taped telephone line or intercepted microwave transmission as many business transactions take place via mobile devices.
• Software that is malicious. Traditional computers are familiar threats to viruses, trojan horses and worms. While mobile devices have not yet become a key goal, security experts are increasingly agreed that mobile devices are targeted.
BestTips
• Consider the security features when selecting a mobile device and make sure they are enabled.
• Setup and update your smart computer with an anti-virus program.
Do not monitor your connections in emails or text message that are suspicious.
• Think carefully which data you would like to store on your computer.
• Pick and install software carefully.
• Keep physical control of the unit, particularly if you’re in a public or semi-public location.
• Disable non-use interfaces like Bluetooth, infrarot or Wi-Fi.
Wi-Fi networks can be used either with identified hotspots or only in trusted locations with secure Wi-Fi.
• Delete all data contained in a system until it is discarded.
• Do not “jailbreak” or “root” the phone.
