Mobile Security

Tips to keep your information protected on mobile devices.

Phones, tablets, and wearable devices routinely store and transmit personal information, so it’s important that each device is configured for maximum security. If you have a device you’re unsure of, see your data plan carrier or local tech support company for assistance if needed.

 

Use the following suggestions:

  • Use a PIN, password, pattern, fingerprint, or face ID to lock your device, preventing unauthorized access.
  • Restrict the information displayed on the screen when your device is locked.
  • Regularly install operating system, app and firmware updates on all your devices.
  • Avoid using unsecured "public" wireless networks, without a VPN connection, as it puts your device and your data at risk.
  • Require a password for app purchases to give you more control over what is downloaded or installed onto your device.
  • Where possible, use anti-malware apps and software to reduce the risk of infection of your device, which could result in loss of, or unauthorized access to your sensitive data.
  • Do not loan your phone to people to use.
  • In the event your device is lost or stolen, wipe it clean of data to protect your information.

 

Find your device:

  • Software (Find My iPhone or Android Device Manager for example) must be installed and active on the device and you must have signed into these services prior to losing the device for this to work.
  • With some devices, you can also ring and/or lock the device with a password, even if you hadn't protected the device with a password before it was lost.
  • Automatically wipe the data after 10 incorrect password attempts.
  • If your device cannot be recovered, you can remotely wipe data if you’ve installed the needed software (Find My iPhone or Android Device Manager for example).

 

Get control over data and location tracking:

  • Your device tracks your recent and sometimes even frequently visited locations. Disabling these services provides more privacy.
  • Some apps track your location, even when you're not using them. Disabling these services provides more privacy.
  • Don’t allow browsers to store information such as usernames, passwords, addresses, etc.

 

Prevent the installation of apps from unknown sources:

As a general rule, you should only install apps from trusted sources, like the Apple App Store or Google Play store. Apple devices are configured to ensure apps are only downloaded from the App Store or a trusted enterprise via secure certificates, and that cannot be changed. Other operating systems such as Android may require a change in phone settings to disallow the downloading of information from unknown sources.

 

Don't jailbreak/root your device:

Sometimes people jailbreak, or root, mobile operating systems to achieve escalation of privilege on the device. By gaining greater privilege on the device, it becomes easier to customize. However, escalation of privilege also makes the device easier to infect or compromise. Anti-malware software becomes more of a necessity when devices are jailbroken.