Simple security tips for your Smartphone Part 2
As one saw in part 1, I came across 2 of the most obvious solutions. These recommendations are aimed at individuals and managers in both public and private enterprises and are based on NSM's advice and recommendations for ICT security. It does not constitute a complete overview, but examples of security measures for each individual user's mobile security.
We assume that you have basic ICT security in place. For example, your phone or PC should not use an operating system that is no longer updated by the manufacturer. Similarly, you should apply strong and unique passwords to the services and applications you access from your mobile device.
3. Prevent others from reading alerts from a locked screen
Many people forget to do something about this function. One often assumes that one always has control over how smart the phone is. Many applications display parts of messages even when the screen is locked. The function is often called notifications and applies to e.g., news, e-mails, meetings, SMS or messages about missed calls. These notifications are visible on the screen even if the device is locked.
Turn off alerts to a locked screen on those apps that have sensitive information or use a case with a flap that covers the screen. You can reduce the risk by using "privacy" protective film, it limits the ability to read the screen from oblique angles.
4. Counteracting eavesdropping
In connection with messages, telephone and video calls, there is always a risk that others will listen. Depending on the mobile device, there are several measures that can reduce this risk.
Note which network (EDGE, 3G, 4G) you are connected to. Preferably use 4G, then you reduce the risk of someone "fooling" your mobile device over to a network without encryption. EDGE (2G) is more vulnerable than 3G, which is more vulnerable than 4G. Mobile security is up to the operator of the mobile network. It is therefore recommended that one (especially abroad) should use messaging services that add encryption.
Messages, voice, and video should be sent encrypted over the mobile network to prevent eavesdropping and tampering.
5. Backup and external storage
It may be desirable to store data from mobile devices in the cloud. This is a convenient way to gain flexible access to your data and can be a great method of backup. However, storing data elsewhere than on a mobile device increases the risk of unauthorized access.
Feel free to set your mobile device to automatic backup, so you do not have to keep this in mind. In some cases, the best option would be to use a storage service that the IT department has either entered into an agreement with or even operates and has control over (private cloud).
6. Delete data from the device if you lose it
If you lose your phone, tablet, or PC, it is not just the value of the hardware that is lost. You also risk data, documents, photos, and e-mail falling into the wrong hands. You should therefore be able to remotely delete the contents of your mobile device if you lose it.
Use the provider's service to delete the device. The mobile device can also be set to delete the content after X number of unsuccessful attempts to enter the PIN code.
7. Prefer 4G over third-party Wi-Fi
I keep hearing that many people see that Wi-Fi is something they always ask for no matter where you are.
Here it is good to be aware that some mobile devices can automatically connect to an insecure wireless network and / or a wireless network that pretends to be a network you have previously used. This can happen without you noticing, so always turn OFF automatic connection to Wi-Fi (this is done in settings).
There are differences in networks and solutions. Older wireless networks (Wi-Fi) can take advantage of technology that is vulnerable and can be exploited by unauthorized persons. Therefore, avoid using Wi-Fi for something that is sensitive, but if you still must, it is important to encrypt the information you send and receive by, for example, using a VPN solution from a reputable VPN provider.
It is therefore important to avoid the general use of Wi-Fi, which does not require a password for connection, and use only known Wi-Fi networks. Avoid using public, free Wi-Fi in, for example, hotels, cafes, and airports, and at conferences. Instead, use your phone for internet sharing (4G mobile data).
Then we have come so far that we have received 7 good pieces of advice. If you follow the next day, I will bring another 6 pieces of advice. Stai tuned for part 3.
Here are several articles on the same topic:
simple-security-tips-for-your-smartphone-part-1
simple-security-tips-for-your-smartphone-part-3
cyberattack-is-your-data-secure
Read more useful articles at: https://www.visualityglobal.com/article/
Author Trond Paulsen