Wednesday, May 18, 2016

How to Keep Mobile Secured?


How to Keep Mobile Secured?

Trt your smart phone like your wallet - keep it safe and on your person at all times.Remember it's not 'just a phone'Remember your smart phone is a computer - all the same security rules apply. This includes checking the authenticity of websites, not clicking on links from people you do not know, and watching out for phishing scams (by email, text or even voicemail) asking for personal information.
Secure your phone:
1. Turn on the security ftures of your phone. All have security settings, so familiarise yourself with them and turn them on.
2. Many mobile allow users to set a or Personal Identifiion (PIN) that must be entered to use the phone. s and PINs make it more difficult for thieves to stl your personal information if your phone is lost or stolen.3. Put a PIN on your SIM card and on your phone so that thieves cannot stl your phone credit or run up your phone bill.4. Consider installing security software from a reputable provider. Anti-virus, anti-theft, anti-malware and firewall software is available for some mobile phone operating systems. Check with your phone manufacturer for recommendations.5. Check for updates to your operating system regularly. Install them as soon as they are available - these updates often contain changes that will make your phone more secure.6. Bluetooth lets you wirelessly connect to devices and transfer information over short distances. For Bluetooth to work, devices need to see ch other and then connect. It is best to lve your phone in undiscoverable mode (hidden) so that it is only visible when you specifically need other people or devices to see it. This mns that s cannot sily see your phone and they cannot sily connect to it unless they alrdy have your Bluetooth address. When connecting using Bluetooth, do so in private, uncrowded ars only.7. Be smart with Wi-Fi. When connecting to the internet using Wi-Fi, try to use an encrypted network that requires a and which you are sure is operated by a reputable provider. Rd our tips for using public wireless networks.Change your settings so that your phone asks permission to join a new wireless network.
Secure your information:

1. Encrypt your data. Some allow you to encrypt the data stored on your phone or memory cards, sometimes through the use of third-party encryption products. Encryption secures your data if your phone is lost or stolen.
2. Back up your data regularly. Set up your phone so that it backs up all your data ch time yousynchronizewith a computer. Alternatively, backup your device to a memory card regularly and keep it in a safe place.3. Do not save s or PINs as contacts on your phone unless you encrypt them properly. With all the PINs and s we have to remember, it is tempting to save them in your phone as fake contacts in case you forget them, but this can ld to a compromise if you lose your phone or the data in it is stolen.4. Avoid online banking in busy public ars. Passers-by could be watching what you are typing (known as shoulder-surfing).
Stay with reputable websites and mobile appliions (apps)

1. If your phone allows you to run appliions downloaded from the internet, make sure you understand the risks that your personal information including your loion, contacts and messages can be brched if the permissions for mobile appliion are not setup properly.2. Most smart allow you to control your personal information accessed by the mobile appliions by choosing permissions at the time of installation.3. Do not get led into the trap of downloading hoax or malicious software that could contain a virus or malware.

4. Think carefully about what information you and your phone shares online and how it could be misused. Your smart phone holds a grt dl of personal information in a single place, making the job of fraudsters very sy. So it's not just about what you put on your social networking profile, but also that it's probably sy to work out who you bank with, where you've recently made transactions, the names of your family and to gln other details from emails or other documents.
Plan ahd:

1. Note down the details of your phone in case of theft. Every phone has a unique International Mobile Equipment (IEME). Most allow you to find out your own by ing in *#06#. Knowing this will help your network provider to stop your phone being used if it is stolen.
2. If you lose your phone or it is stolen, report it to your network operator immediately so it can be disabled. If you find it again you can sily re-enable the phone.3. To assist you in case of mobile theft or loss, ask your provider or manufacturer whether it has services such as mobile tracking and the ability to remotely wipe your information stored on the phone.
Be smart about how and where you use your phone:

1. Turn Bluetooth off when you aren't using it. Bluetooth lets you wirelessly connect to devices and transfer information over short distances. For Bluetooth to work, devices need to see ch other and then connect. It is best to lve bluetooth off until you are using it or put your phone in undiscoverable mode (hidden) so that it is only visible when you specifically need other people or devices to see it. This mns that s cannot sily see your mobile phone and they cannot sily connect to it unless they alrdy have your Bluetooth address. When connecting using Bluetooth, do so in private, uncrowded ars only.2. Stick with reputable sites and appliions when downloading appliions from the Web. Many mobile include internet browsers that let you surf the web and download content to the phone. Do not download content , particularly appliions, from unknown or unreliable sources. They could contain malicious software. Use the appliion store or website of your mobile phone operating system or manufacturer.3. Turn GPS off when not using it. While GPS can provide grt benefits in finding out where you need to go, it can also be used by others to see where you or your phone is loed.4. Log out of websites when you are finished. It can be tempting to stay logged into a website to save time or so the site can remember your . It is best not to do this because if your phone is stolen or lost, a user can access your account.5. Think before you click. Do not open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages unless you are expecting them and they are from a trusted source. They could contain malicious software or take you to a malicious website.
Protect against malicious software:

Watch out for prompts or warnings asking if you want to allow software to install or run - if you do not know what it is or what it relates to, err on the side of caution. Criminals sometimes try to dupe users into downloading malicious software (often referred to as 'social engineering').
Symptoms of malicious software infection:

Your phone may have been infected with malicious software if any of the following things have happened:
There is a sudden large incrse in your phone bill with no clr rour phone has emails and messages in the sent folder that you did not send, orThe user interface has changed without you taking any action to change it.Contact your service provider for instructions on how to identify and remove malicious software.



No comments:

Post a Comment