You are viewing the legacy version of iKeepSafe.org Return to Current Website iKeepSafe

Mobile Privacy Best Practices

If you have a smartphone, you need mobile phone security software installed.

Smartphones are now mini-computing devices that carry a tremendous amount of personal information, store passwords, access your financial accounts, hold your calendar, email, and more. Because of the amount of data stored and accessible through a smartphone, and the value of the device itself, thieves and cyber-thieves view cell phones as gold mines.

A recent survey revealed that last year 5.6 million smart-phone users showed symptoms of malicious software–experiencing undesired behavior on their phones such as the sending of unauthorized text messages or the accessing of accounts without their permission (click to tweet).

To protect your smartphone from exploitation requires three actions:

  1. Install mobile security software and keep it up to date.
  2. Only download applications from trusted, tested sources – a great many mobile applications are malware delivery tools.
  3. Watch your URL’s – don’t click on links you aren’t 100% sure are legitimate, instead, use a search engine and find the correct URL yourself.

Even with these three safeguards in place, monitor, monitor, and monitor. Watch your phone bill for unusual charges, pay attention if your phone acts oddly – like decreased battery life or random text messages – as these are signs your phone may be infected.

Note: If you use your phone for work, and it carries sensitive information about the company, their products, or strategy, double your vigilance so you don’t become a hacker’s entry point into your company.

Generation Safe
Blog
Google Plus