Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

4 Ways to Protect the Information on Your Cell Phone

March 23, 2016 No Comments

Featured article by Joey Tomina, President of Rushstar Wireless

shutterstock_180056633

Cell phones are so much more than an easy way to keep in touch with loved ones. Smart phones are a pocket-sized computer that’s capable of everything from browsing the internet, to finding your location through GPS, and even helping you complete business-related tasks from a distance. Unfortunately, as convenient as the cell phone is, it’s all rife with possible security risks – particularly in regards to your personal data.

More of us have cell phones today than ever before, and we use these devices as a way to access our online identity. Yet, many people fail to consider the ways they should be securing their phones against information breaches, in the event of theft, or hacking. Today, all of the information that you keep on your smartphone, and the pages of data that is contained within your social media accounts, emails, photos, important documents, and messages, is accessible by thieves and con-artists if you don’t know how to protect it. So how can you reduce your vulnerability?

Protecting Your Privacy with Passwords

Perhaps the first and most obvious step to cell phone security is ensuring that unauthorized people cannot access your phone if they ever get hold of it. One of the best ways to keep your personal data locked away is to use a passcode or screen lock that requires authentication. Today, security features such as automatic locking and authentication for screen access are a standard part of most smart phone operating systems – typically found under settings. Enabling them takes a matter of moments, yet Android Central discovered that about a third of their readers don’t bother to lock their phones.

You lock the door to your house and car, and use passwords to protect your social media accounts – so why not take the same measure with your phone? Remember, when setting up a passcode, follow the same rules as you would with any other device. Don’t use your social security number or birthday for a passcode, and try to come up with something more complicated than “1234”. Some experts believe that pin options are more secure than swipe patterns, as the chances of guessing a number combination are often lower.

Avoid Untrustworthy Apps, and Don’t Root or Jailbreak

While it might seem like a good idea to install apps onto your phone that you found outside of the Google Play or App store, the truth is that they are often less secure. Everyone from Google and Microsoft, to Apple and Blackberry watch over the apps that are contained within their portals, meaning that they should remove apps with malicious code before you get a chance to install them. Downloading unknown apps and files onto your phone can be an easy way for you to open the door to malicious spyware and viruses that could steal your information.

Similarly, jailbreaking or rooting your phone can also prove to be an incredibly dangerous idea – particularly if you don’t know exactly what you’re doing. The reason is that the process breaks down your operating system and provides you with access to basic code. If you can access that information, the chances are that malicious code will have an easier route of access to make changes too.

Be Cautious Online, and Disable Features

If you’re running low on your data plan, finding a wireless network when on the go can be a great thing. However, you must be careful about the Wi-Fi networks you sign on to. Some networks have malicious settings that will allow other people to access your phone’s stored information and files. Stick to using known sources for your internet connection, and avoid using public Wi-Fi to access any sensitive information – such as online banking.

At the same time, when you’re not using features like Bluetooth, GPS, and wireless, disable them. Not only do these things drain your battery, but they can also open up doorways for hackers and malicious content.

Update Software and Trustworthy Apps

Updates may seem annoying and time-consuming, but avoiding them can leave gaps in your code that make your phone vulnerable to attack. IOS and Android developers are constantly looking for new ways to close potential exploitation spots and loopholes with their updates, and if you get behind, you could be missing out on a crucial fix.

As malware and spyware become increasingly problematic for cell phone users, it can also be helpful to install reliable security software – similar to the antivirus programs that you have on your computer. This software will help to protect your privacy against outside influences, but like your phone, it’s important to keep it updated if you want to get the best results.

In Conclusion…

According to Truste Inc. around 76% of smartphone users consider themselves to be the number one form of defense when it comes to defending their cell phone privacy. As such, it’s up to you to educate yourself about how you can protect the private information accessible via your mobile device. Following the above advice will be a good start, but it’s important to remember to stay proactive when it comes to protecting your data.

joey

Joey Tomina is the President of Rushstar Wireless and is nationally recognized as one of the top leaders in the wireless industry for his work with the leading carriers, MVNO’s, & payment processors in nationwide sales, distribution, and operational development. He has15 years of executive sales & management experience with an emphasis in direct and indirect market development and distribution.
 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech