Following are few steps that you can
follow to secure your mobile devices form attackers. Security countermeasures are being developed and applied to
Smartphone, from security in different layers of software to the dissemination
of information to end users. There are good practices to be observed at all
levels, from design to use, through the development of operating
systems , software layers, and downloadable apps.
How to
1.
Add protection
You can
activate the security features in the phone. Apple
device users can enable the “Find My iPhone” or “Find My iPad” feature in
iCloud, which will help them locate the device if it is missing and erase the
data on it. New Apple devices also include an activation lock feature that
prevents the devices from being reactivated without the owner’s credentials.
Android device users can log into Android Device Manager to locate their
devices on a map and set up the lock and erase capabilities.
2.
Set a strong password
choose long, complex passwords
for their devices, instead of using the standard four-digit code. A strong
password is at least eight characters long and includes a combination of
letters, numbers and special characters. Employees should also set their
screens to lock after a period of inactivity — for example, two minutes.A
strong password can provide a valuable layer of protection for mobile data.
What to do if your device is lost or stolen
1. Report the missing device
Contact the specialist
organization to stop the record to anticipate unapproved utilization. The
transporter may likewise add the gadget to a worldwide database of boycotted
telephones, which can help prevent another client from initiating it.
Additionally tell the police and give them the gadget's area and whatever other
data that could recover it.
2. Wipe the Device
If you believe sensitive
data stored on the device may be at risk, wipe it remotely. This will reset the
device to its factory installed settings. Any passwords stored on the phone
should be changed as an extra precaution. For example, if an email password is
automatically saved in an email application or a banking password is kept in a
note-taking app on the device, the owner should log into the email or banking
service from another device and reset it.
Contact the service
provider to put a hold on the account to prevent unauthorized usage. The
carrier may also add the device to a global database of blacklisted phones,
which can help stop another user from activating it. Also notify the police and
give them the device’s location and any other information that could help to
retrieve it.
What
are the consequences of mobiles not being secured?
·
The attacker can change your phone
to a zombie machine
·
A compromised Smartphone can
record conversations between the user and others and send them to a third party
·
The attacker can prevent the
operation and/or be starting of the Smartphone by making it unusable
·
The attacker can remove the
personal (photos, music, videos, etc.) or professional data
No comments:
Post a Comment