CELL PHONE SECURITY: Best practices to protect yourself and your personal information: Password-protect your phone. This is the simplest step you can take to prevent your information from being accessed. Make sure it is a strong password that is not similar to or associated with any other personal information. Install Security Software. There are a number of companies which offer anti-virus, malware and security software designed especially for Smartphones. Make sure to download security software updates. Be aware of what you are doing on your phone. The same precautions you would take while on your home computer apply to your Smartphone. Double check URLs for accuracy, don’t open suspicious links, and make sure a site is secure (https) before giving any billing or personal information. Do not “jail-break� or use a “jail-broken� phone. A “jail-broken� phone is a phone that has gone through a process which opens its operating system to applications which would otherwise not be compatible with the operating system. However, once “jail-broken�, the phone is vulnerable to anything the user downloads. Note: The application necessary to jail-break an iPhone may put both your phone and PC at risk. When installing an app on any Smartphone, take the time to read the “small print�. Evaluate the information the app requires access to, and consider if this information is necessary for the app to run successfully. If you cannot see a reason for the app to have access to the information, you should reconsider installing the app. Install a “phone finder� app. These apps are designed to help you find your phone if it becomes lost or stolen. Enroll in a backup / wiping program. You can enroll in a program that will back up the information on your Smartphone to your home computer. Many of these services are also able to “wipe� your phone if it is lost or stolen so that no data remains on the device itself. These services are available through your Smartphone’s manufacturer or through your wireless provider. iPhones have a built-in “wipe� feature that can be turned on that will wipe the phone after 10 failed log-on attempts. Limit your activities while using public Wi-Fi. Try not to purchase things or access email while using a public Wi-Fi zone. Public Wi-Fi hotspots are targeted by hackers since they can give the hacker direct access to your mobile device. Using your 3G network provider connection is much more secure than using a public Wi-Fi connection. Check URLs before making a purchase using your Smartphone. Any page that requires credit card information should start with https://. This means it is a secured site. If your Smartphone is lost or stolen: If you have enrolled in a backup / wiping program: Contact the administrator of your program and have them “wipe� your phone. Call your service provider and have them cancel your service and report your phone missing. **Smartphone Terms defined 1G vs. 2G vs. 3G vs. 4G: The G in these terms stands for generation. Therefore 1G would be the first generation of application services. This includes wide-area wireless voice telephone, mobile Internet access, video calls and mobile TV, all in a mobile environment. Each generation expands its capabilities and 4G is currently the benchmark. Applications (Apps): computer software designed to help the user to perform singular or multiple related specific tasks. Broadband: A term used to describe high bandwidth, or bit rate transmission of data signals. Bluetooth: A feature which allows communication (or connection) between a mobile phone and a hands free headset. MMS (Multimedia Messaging Service) : A standard way to send (picture) messages that include multimedia content to and from mobile phones. Personal Information: The types of information often stored on a Smartphone include, but are not limited to: bank user names and passwords (Banking applications); credit card information (online shopping); utility account information (bill tracking applications); email accounts; GPS information; and social media contacts. SIM – Subscriber Identification Module: A removable smart card that stores information such as user identity, location and phone number, contact lists and stored text messages. SMS : SMS stands for short message service. SMS is also often referred to as texting, sending text messages or text messaging. The service allows for short text messages to be sent from one cell phone to another cell phone or from the Web to another cell phone (About.com). Smartphone : A Smartphone is a mobile phone offering advanced features, similar to the functions on a PC. Touch Screen: A touch screen is an electronic visual display that can detect the presence and location of a touch within the display area. Wi-Fi : Wi-Fi simply refers to wireless communication between electronic devices. These include personal computers, video game consoles, Smartphones, or digital audio players. Wi-Fi connects to the Internet when within range of a wireless network (Wi-Fi hotspot). Wi-Fi hotspots can be private (protected by a password) or public (available to all local users). Smartphone FAQs What are the benefits of having a smartphone? Benefits of a Smartphone include its size and mobility. These devices are quickly replacing desktop computers for browsing websites, downloading music, checking emails, social networking and even uploading files. Can my smartphone get a virus like my computer? Yes. A smartphone runs applications just as a computer would and is, therefore, susceptible to viruses specifically targeting Smartphones. The best way to protect yourself from this is to immediately install an anti-virus program on your phone. What should I do with my Smartphone when I am no longer using it? The information on a Smartphone can be accessed even if the phone isn’t being used anymore. When disposing of your Smartphone, information needs to be wiped clean from the phones memory and the factory settings restored. On the iPhone, you must also select a “data wipe� to ensure destruction of your personal information. If possible, the SIM card should be destroyed unless it is being transferred to another device. Regards, keepmyID.org
Related Articles -
identity, theft, protection, service,
|