Mobile Security Tips

The ever-increasing capabilities of smartphones are turning into a necessity across every generation and rapidly growing into attractive targets for malicious attacks. Mobile phones offer many more functions than traditional desktop computers, however, face the same security challenges. In fact, their mobility exposes them to even more risks different from those of a system in a fixed location. These mobile phones are usually attacked by worms, trojan horses or other virus families, which weaken your privacy and security and take complete control over the device.

Here are a few steps vital to secure your mobile phone.

 

BEFORE USING YOUR MOBILE PHONES:

  • STEP 1: Carefully read and follow the manufacturer’s manual to set up your mobile phone.
  • STEP 2: Record the International Mobile Equipment Identity number in case you want to track your mobile.
  • Note:This content is printed below the battery of the phone, or you can access it by keying *#06# on the phone.

 

Mobile Security Threats You Can Protect Yourself From

  • Device and Data Security Threats Threats regarding unauthorised/intentional physical access to your mobile phone and other lost or stolen mobile phones.
  • Connectivity Security Threats Threats regarding the connectivity of mobile phones to unknown systems, and networks via Bluetooth, WiFi, USB, etc.
  • Apps and OS security Threats Threats to mobile phones arising from vulnerabilities in Mobile Applications and Operating Systems

What are the consequences of attacks against Mobile Phones?

  • Exposure of the user's confidential data stored/transmitted through mobile phone.
  • Monetary loss due to the unknown utilization of premium and highly-priced SMS and Call Services via malicious softwares.
  • Privacy invasion, which includes unauthorized viewing of private messages and calls, and location tracking.
  • No control over your smartphone, resulting in targeted malicious attacks.

Mitigating Mobile Data Security Risks

Dos and don’ts for Mobile Device

Dos

Record IMEI Number:

  • The unique 15 digits IMEI number allows you to register a complaint in case your phone is lost. This will help you track your mobile phone through a service provider. 

 

Enable Device locking:

  • The unique 15 digits IMEI number allows you to register a complaint in case your phone is lost. This will help you track your mobile phone through a service provider. 

 

Use a PIN code to lock the SIM Card:

  • A PIN code (Personal Identification Number) for your SIM card (Subscriber Identity Module) will prevent robbers from using your phone once it’s stolen. After you turn on the SIM security, each time the phone starts it will ask for the SIM PIN.
  • Use a strong password to secure your data stored on the memory card.

Report lost or stolen devices

  • ·        If you find any lost/stolen devices, immediately report them to the nearest Police Station and the concerned service provider.

 

Use the mobile tracking feature

  • This will help you track your phone in case it is lost/stolen. This feature automatically enables a message to two preselected phone numbers of your choice, every time a new SIM card is inserted.
Don'ts
  • Ensure your mobile phone is never left unattended
  • Turn off your applications such as camera, audio/video players and other connections such as Bluetooth, WiFi when not in use, as they may pose security issues and can drain out the battery.

Dos and Don'ts for Data Security:

Dos

Make sure you backup necessary data regularly

  • You can set your phone up in a way that it backs up your data whenever you sync it. You can also copy your data on a separate memory card using the Vendor’s document backup procedure.

Reset to 'factory settings'

  • If and when a phone is permanently given to a new user, ensure the personal data is completely wiped out. This can be done by resetting the device to 'Factory settings'.

Mitigating Mobile Data Security Risks

Dos and don’ts for Mobile Device

Dos

  • Use the feature in hidden mode. This disables its visibility to other malicious users/devices.
  • To avoid revealing your Mobile Phone’s identity, change the name of your device.
  • Note: Your Bluetooth name will be the mobile model number by default.

  • Add a password to your Bluetooth while pairing it with other devices for stronger security.
  • Disable your phone’s Bluetooth when not required.
  • Use the temporary time limit feature so that your Bluetooth is automatically deactivated, thereby protecting your device.
Don’ts
  • Do not allow unknown devices to connect to your Bluetooth device
  • Never keep your Bluetooth on for a very long time
  • Switch off ‘Always discoverable’ mode in your Bluetooth settings



Note: Your default ‘Always On, Always Discoverable’ settings can attract Attackers.

Wi-Fi:

Wi-Fi stands for ‘Wireless Fidelity’. It refers to the wireless networking technology that allows devices to connect/communicate with each other over a wireless signal. Several devices and systems include Wi-Fi capability, enabling them to connect to other wireless networks. These devices can connect to the Internet using Wi-Fi.

Dos
  • Only connect to trusted networks.
  • Use Wi-Fi when required or switch it off when not required.
  • Connect to only private networks as public networks may not be secure.
Don'ts
  • Refrain from connecting to unknown/untrusted networks.

Mobile as USB:

Your mobile phones can be used as a USB memory device when connected to a computer with the USB cable provided. The memory and the memory stick of your mobile phone can be accessed as USB devices.

Dos
  • Use an updated antivirus to scan your phone’s external memory and memory card, when you connect the phone to a personal computer.
  • Ensure you regularly backup your phone’s external memory card to avoid data loss in case of a system crash or malware penetration.
  • Scan your data with the latest updated antivirus before transferring it from your computer to your phone.
Don'ts
  • Do not store confidential information like usernames/passwords on your mobile phones.
  • Do not forward the data that is virus-affected to other mobile phones.

Mitigating Mobile Application and Operating System Risks

Application and Mobile Operating System:

  • Frequently update your mobile operating system.
  • Upgrade to the latest version of your operating system.
  • Install applications from trusted sources only.
  • Ensure you install your security software from a reputable provider and update them regularly.
  • Thoroughly review the App before downloading it from a third party. Check the features and requirements.

The location tracking service allows authorities to check and monitor the whereabouts of registered cell phones. This can be done for legitimate as well as malicious purposes.

Ensure you check the source of all your files/apps downloaded on your phone for security purposes.