Smart Phone Security

We have come to depend on our smart phones so heavily that it is hard to remember what we did before we had them. If you have a smart phone, you now carry a fully functional computer in your pocket or purse. That is a tremendous amount of information at your fingertips! Therefore, it is paramount that you safeguard the smart phone.

Common Risks for Smart phones

Take a moment to consider each of these areas:

  • Loss of device and information theft. Smart phones are small and can easily be lost or stolen. Unauthorized users may access your accounts, address lists, photos, and more to scam, harm, or embarrass you or your friends. They may leverage stored passwords to access your bank and credit card accounts, steal your money, or make credit card charges. They may also gain access to sensitive material.
  • Social engineering. A common mobile threat is social engineering. Whether via text message, image, or application (app) to download, an incoming communication may be an attempt to gain access to your information. A current example consists of a text message that comes from an unknown number telling you that if you click on the link provided, you will have access to thousands of free ring tones. If this sounds too good to be true, that is because it is. The link is a malicious link. Clicking on it will compromise the security of your smart phone.
  • TMI (too much information). Guidelines for protecting privacy, safety, and reputation when sharing via computers also apply when sharing via smart phones. Mobile devices enable instantaneous capturing, posting, and distribution of images, videos, and information. They may also broadcast location information.
  • Public Wi-Fi. Smart phones are susceptible to malware and hacking when leveraging unsecured public networks.
  • Bluetooth and near field communications (NFC). Bluetooth is a wireless network technology that uses short-wave radio transmissions to transmit voice and data. NFC allows for smart phones to communicate with each other by simply touching another smart phone, or being in close proximity to another smart phone with NFC capabilities or an NFC device. Risks with using NFC and Bluetooth include eavesdropping, through which the cyber criminal can intercept data transmission, such as credit card numbers. NFC also has the risk of transferring viruses or other malware from one NFC-enabled device to another.

Simple Steps to Protect Your Smart phone

  • Update the operating system. Smart phones are computing devices that need to be updated. Updates often provide you with enhanced functionality and enriched features, as well as fixes to critical security vulnerabilities. Your smart phone manufacturer should notify you whenever an update is available.
  • Use of security software is a must. As the smart phone market is increasing, so too is the amount of malware designed to attack smart phones. The software security solutions that are available for desktops and laptops are not as widely available for smart phones. A key protection is to use mobile security software and keep it up to date. Many of these programs can also locate a missing or stolen smart phone, back up your data, and even remotely wipe all data from the smart phone if it is reported stolen.
  • Password-protect your device. Enable strong password protection on your device and include a timeout that requires authentication after a period of inactivity. Secure the smart phone with a unique password – not the default one it came with. Do not share your password with others.
  • Think before you click, download, forward, or open. Before responding, registering, downloading, or providing information, get the facts. No matter how tempting the text, image, or application is, if the download is not from a legitimate app store or the site of a trusted company, do not engage with the message.
  • Understand the terms of use. Some applications claim extensive rights to accessing and leveraging your personal information. If the app requires more access to your account or device than is needed to run the service, do not continue. In addition, be aware that terms can change over time. Review your terms of use often.
  • Be cautious with public Wi-Fi. Many smart phone users use free Wi-Fi hotspots to access data and keep their smart phone plan costs down. There are numerous threats associated with Wi-Fi hotspots. To be safe, avoid logging into accounts, especially financial accounts, when using public wireless networks.
  • Disable Bluetooth and NFC capabilities when not in use. Capabilities such as Bluetooth and NFC can provide ease and convenience in using your smart phone. They can also provide an easy way for a nearby, unauthorized user to gain access to your data. Turn these features off when they are not required.
  • Enable encryption.  Enabling encryption on your smart phone is one of the best ways to safeguard information stored on the device, thwarting unauthorized access.
  • Securely dispose of your device. With the constant changes and upgrades in the smart phone market, many are upgrading their devices on a regular basis. It is important that you wipe the information from your smart phone before disposal. Additionally, make sure any secure digital (SD) cards are removed and erased. If you are not redeploying the subscriber identity module (SIM) card to another device, then make sure your personal information stored on the SIM card is erased or destroyed.

For additional information, please visit the following sites:

About.com – 14 Ways to Find a Stolen or Lost iPhone:
http://ipod.about.com/od/iphonetroubleshooting/tp/14-Ways-To-Find-A-Lost-Or-Stolen-Iphone.htm
FTC – How to Dispose Your Mobile Device Securely:
http://www.consumer.ftc.gov/articles/0200-disposing-your-mobile-device
University of Northern Colorado:
http://www.unco.edu/cybersecurity/students/mobile.html
US-CERT – Cyber Threats to Mobile Phones:
http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf
Sophos – Android Tool:
http://www.sophos.com/androidsecurity
Microsoft – Secure Your Smartphone:
http://www.microsoft.com/security/online-privacy/mobile-phone-safety.aspx