5 Phone Security Mistakes you’re probably making

In this enlightened technological age, we all think we’re clued up on tech security, don’t we? We know to secure our PCs and laptops with passwords, two-step verification, anti-virus software, firewalls and anti-spyware and keep a check on our browser security settings. We’ve read the data breach horror stories and the torrid tales of hard drives being wiped clean by ransomware and we’re savvy enough to have all the tools in place to make our digital fortress impregnable. We’re proud that those rookie mistakes in digital security could never happen to us.

 

However, despite the fact that for many of us, a huge amount of personal data (our whole lives in effect) is stored on our mobile phones, we often don’t subject our mobile devices to the same super-strict security protocols we are so conscientious of keeping up to date on our PC’s and laptops. Mobile phone security mistakes can be just as costly as those on your other devices, and there are 5 common mistakes that you are probably making right now.

1. Not using a password

This one seems like a no-brainer, but, shockingly, 30% of mobile phone users do not have a password, pin lock or other form of access protection set up on their phone. Be sure to use at least a four-digit code, or, for extra peace of mind set a longer password. The way to do this varies by model of phone, but is generally under the “settings” section. Some phones will scan your fingerprint instead of an alphanumerical code. However, security experts like to remind us that you can always reset a password if you need to; you can’t change your fingerprint.

2. Trusting public Wi-Fi

Fraudsters can easily create an open Wi-Fi network that has a similar name to that of a coffee shop, and capture private data from the people who unwittingly use it. If you must use open Wi-Fi, browse the Internet only, and make sure the sites you visit display in the search bar with “https.” Don’t make purchases, or sign into bank and credit card accounts—save those tasks for when you’re at home.

3. Sharing your location

Your phone uses a combination of cellular, Wi-Fi, Bluetooth and GPS networks to pinpoint its location at all times. This comes in handy for finding the nearest pub or using Google Maps, but it also means that your location data is accessible to anyone with your phone and the wrong intentions. If the idea of someone being able to track where you live, work and play is disturbing to you for whatever reason, disable your phone’s location services.

 

Don’t announce, “I’m not home!” on Facebook and Twitter. Time Magazine estimates that 78 percent of burglars use social media to choose the location of their next victim, so avoid real-time posts about holidays. If you’re dying to share that photo of the Maldives or a giant margarita, email it to a select few, rather than broadcasting it via social media. Set your Facebook privacy setting so that you can review tagged posts from friends and relatives before they go up on your timeline. Once you’re back home, feel free to share your pics, blog about your fabulous trip, and post to Instagram. Just use the hashtag “#latergram” to indicate that your photos are post-dated.

4. Downloading dodgy apps – and not updating existing ones

Only download apps from official, trustworthy app stores (like the Apple App Store or Google Play Store). Check an app’s rating and read the reviews to make sure it’s widely used and respected before you take any action.

 

Similarly, you should ensure you enable updates for all you apps. Apps update often for a reason. Sometimes people, fail to or ignore updating their phones for long periods of time. These updates are not only features updates, but security updates. Many hackers thrive on the fact people do not update their apps or phones and take advantage of bugs in them to steal your data.

5. Blurring the lines between personal and professional devices

Bring your own device (BYOD) has gained popularity over the last few years, especially in the startup business market. An increase in mobile and remote working practices means nobody wants to carry multiple smartphones and constantly utilise different mobile operating systems to check email and manage calendars. However, the security risk is often overshadowed by convenience. Employees’ personal devices may have access to and store confidential corporate data directly on the device. When an employee leaves an organisation, that information is still present on their device and can be accessed indefinitely. In terms of data security this is a major mistake. Ensure that you are up to date with your organisation’s policies surrounding the use of personal devices for business use and adhere to them at all costs so that you are not personally compromising security.

Des Nnochiri has a Master’s Degree (MEng) in Civil Engineering with Architecture, and spent several years at the Architectural Association, in London. He views technology with a designer’s eye, and is very keen on software and solutions which put a new wrinkle on established ideas and practices. He now writes for markITwrite across the full spectrum of corporate tech and design. In previous lives, he has served as a Web designer, and an IT consultant to The Learning Paper, a UK-based charity extending educational resources to underprivileged youngsters in West Africa. A film buff and crime fiction aficionado, Des moonlights as a novelist and screenwriter. His short thriller, “Trick” was filmed in 2011 by Shooting Incident Productions, who do location work on “Emmerdale”.


Posted

in

,

by

Tags: