Eleven Smartphone Habits to Increase Security

Eleven Smartphone Habits to Increase Security

With so many smartphones in use today, people should consider being smarter about their security practices. In fact, a survey conducted by AVG Technologies of 5,000 smartphone users in the U.K., U.S., France, Germany and Brazil concluded that one in every four smartphone users store photos on their phone that could present a potential privacy problem, should the device be lost or stolen. Respondents were openly aware of data threats, with 50% recognizing that mobile devices are less secure than computers, but they still missed potential privacy implications.

CEO of AVG Technologies, JR Smith, recognized that the survey demonstrated consumer confusion about safe usage of mobile devices, and he felt that companies should educate consumers more about privacy and security.

AVG Technologies offers the following advice to assist people with the security of their smartphones:


  1. Purchase apps from reputable app stores only, such as the Google Play store or iTunes.
  2. Do not install anything that sounds too good to be true, like free ringtones or free wallpaper.
  3. Keep your phone’s operating system up-to-date.
  4. Install an anti-virus app on your smartphone.

    In addition, I think it is also important to:

  5. Set up password security on your phone.
  6. Turn off WiFi and Bluetooth. These connections can allow hackers a gateway into your phone.
  7. If you make a purchase or bank from your smartphone, be sure to log out of those sites once transactions are completed.
  8. Do not store usernames and passwords on your phone.
  9. Avoid transactions while connected to public Wi-Fi.
  10. Sync your phone’s data to your computer and/or back up everything on your phone onto a flash drive. Be sure to schedule this task based on the sensitivity and volume of data stored on your phone.
  11. When you upgrade your phone, be sure to delete all the content from your old phone. See the phone’s manual for assistance and delete contacts, personal information, call history, web search history and any saved media. *(Typically in your phone’s settings there is an option for “erase all content,” “factory data reset” or something similar.)

As an avid iPhone user, I appreciate companies that take the time to do surveys and publish the results, because it helps me to stay focused on mobile security. It’s so easy to simply pick up my smartphone and do just about anything with it; however, with a personal smartphone security plan in place, I am taking the necessary steps to protect my data as well as my identity.

Source: http://www.informationweek.com/security/privacy/smartphones-foolish-security-choices/240149365

 

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3