Search This Blog

Saturday, November 3, 2012

Is Your Cell Phone Tapped? - Everything You Need To Know About Securing Your Cell Phone




7 Essential Mobile Security Tips

Secure your mobile gear and data from loss or theft



If your laptop (or other mobile device you work on) were lost today, what's the worst that could happen? That's the question everyone who works remotely should ask, especially before working on the road or using unprotected public networks.
Securing your portable devices—whether they're laptops, netbooks, BlackBerrys, USB memory sticks, etc.—and the data that’s accessed by them from loss and cybercrime may be your most important responsibility as a mobile worker.
Here are some important mobile security tips for keeping your data and gear safe at all times:

1. Carefully consider what sensitive information is stored on your laptop/device.

Make sure any sensitive or confidential information stored on your laptop, cell phone, and other mobile devices really needs to be there. Sensitive data includes proprietary company or client information, as well as customers'—and your own—personally identifiable information (such as credit card numbers, Social Security numbers, or even just names and birthdays). Unless you truly need to directly access this info while you're mobile, consider removing the data completely or just remove the sensitive portions of it.

2. Take extra precautions to protect any sensitive data you do need to access.

Storing the data on a server, if possible, and accessing it via secure methods (like VPN) would be safer than storing it locally. If that's not possible, use a program like the open-source encryption utility TrueCrypt to secure all local files and folders you wouldn't want anyone to access in the event of theft or loss.

3. Perform regular, essential maintenance.

Backups are like insurance—while you don't want to ever have to need it, you'd be glad to have it in an emergency. So, especially before taking your mobile devices on the road, it's vital to make a backup of your documents—or, better yet, a clone of your entire hard drive—and keep it in a safe, separate location from your main device. Also get the latest security updates and patches for your operating system, browser, firewall, and antivirus programs. These should all be part of your regular computer/device maintenance.

4. Protect your passwords and logins.

First, make your passwords are strong enough. The, make sure you're not storing your logins anywhere they could be easily discovered or stolen. For example, turn off your browser's automatic password-remembering functions, delete any saved login shortcuts (like cached VPN credentials), and shred any passwords you have written down. Instead, you can use password management software to help securely store and remember your username and password combinations.

5. Secure your Internet connection.

Connect to networks using the highest level of security available, such as WPA2 for wireless networks. Connecting to unknown, open wireless networks is very risky. If only unsecured networks are available (e.g., at public wireless hotspots), take extra care with these steps:

6. Take steps to prevent the physical theft and loss of your devices themselves.

Keep an eye on your property when in public, use inconspicuous bags to carry your items (like a backpack holding your laptop in a protective sleeve), and, in general, try not to advertise that you have theft-worthy devices on hand. Hard-to-remove imprints or labels applied to cases, cable locks, and other security devices can also thwart would-be thieves.

7. Be proactive about protecting your data and gear now.

If your laptop or other device does get stolen or lost, tracking services and recovery software products, as well as features such as remote wipe for BlackBerrys and other smartphones, can help you get it back--but you have to set up the software/service first (i.e., before your device disappears).
Being mobile has so many benefits. Adequately preparing for the additional risks that portability presents can help give you peace of mind while you enjoy that freedom.





Nowadays, mobile phones are becoming like mobile computers. Mobile phones permit you to access the internet and email, download applications and games and store personal contacts, photos and information. You have to secure your phone in order to protect your personal information. Your mobile is made susceptible to viruses and malicious software by its features that also make your phone ‘smart’. If your phone is not secure and it is lost or stolen, your personal information like passwords, banking details, emails and photos could be used to access your money or to filch your identity.
Tips to Make Your Mobile Phone Secure
Since your smartphone brings some really vital data that may be of vast worth to you, it is best to secure your mobile phone. For managerial on the move, Smartphones have become great enablers. However, they don’t know that these devices are susceptible to security intimidation. By taking a little caution in handling, you can save your mobile from security breaches. This article provides some information and tips on how to secure your mobile phone.
Tips to Make Your Mobile Phone Secure


  • Turn on security features of your mobile phone. All phones have security settings so familiarize yourself with them and turn them on.
  • Note down the details of your phone in case of stealing. Every phone has a unique International Mobile Equipment number (IEME). Most phones permit you to discover your own by keying in *#06#. If your phone is stolen, knowing this number will help your network provider to stop it being used.
  • On your phone, don’t save passwords or PINs as contacts. It is appealing to save all the PINs and passwords in your phone as fake contacts in case you forget them as you have to remember them.
  • Set and preserve strong passwords. Many mobile phones permit customers to set a password or personal Identification number (PIN) that must be entered to use the phone. If your phone is lost or stolen, Passwords and PINs make it more difficult for thieves to steal your personal information. Put a PIN on your SIM card so that thieves can’t steal your phone credit or run up your phone bill. Most mobile phones have an alternative to request a PIN each time you switch your phone on.
  • When you do not use GPS, turn off it. GPS can give great benefits in searching out where you need to go, it can also be used by others to see where you or your phone is situated.
  • Be smart with WiFi. Try to use an encrypted network that requires a password when connecting to the internet using WiFi.
  • Check for updates to your phones in service system regularly. Install them as soon as possible because these updates contain changes that will make your phone more secure.
  • Don’t open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages unless you are expecting them and they are from a trusted source. So, think before you click as they could contain malicious software or take you to a malicious website.
  • Be careful, when you download the applications to your phone from the Web. Advanced mobile phones can have internet browsers that let you surf the web and download content to the phone. Do not download content for example applications from an unknown or unreliable source as they could contain malicious software. Utilize the application store or website of your mobile phone operating system or manufacturer to be safe.
  • Install security software only from a reputable provider. Anti-virus and firewall software is available for some mobile phone operating systems and so check with your phone manufacturer for suggestions.
  • When you not use Bluetooth, turn it off. Bluetooth allows you to connect devices wirelessly and it transfer information over short distances. Devices need to see each other for Bluetooth to work and then connect. It is best to leave bluetooth off until your phone in undiscoverable mode (hidden) so that it is only observable when you specifically need other people or devices to see it. Means hackers cannot see your mobile phone and they cannot connect to it unless they already have your Bluetooth address. Connect using Bluetooth in private and uncrowded areas only.
  • Before selling your phone swipe the data clean: Also, make sure your phone carries absolutely no data if you’re selling your phone. Use the ‘Factory Reset’ feature of the phone to wipe off all your personal data after removing the SIM card and memory card, before handing the phone over to the buyer.
Signs of malicious software infection:

If your phone has been infected with malicious software if any of the following things have happened:
  • The user interface has changed although you have not taken any action to change it.
  • There is a sudden large raise in your phone bill with no clear reason.
  • Your phone has emails and messages in the sent folder even if you did not send it.

No comments:

Post a Comment