Create a Safer Environment for your Mobile Device

Article ID: 
1412

sites/brown.edu.information-technology.knowledge-base/files/smartphone_w.jpgSmartphones and tablets now let us put the power of a computer in a pocket, purse or small bag, meaning it is often at hand and on duty 24×7. Add to the mix that these mobile devices tend to carry more personal information than your desk/laptop did, many are unprotected, and the instances of mobile malware have risen 185% in less than a year [ 1 ]. The result? You’re at an ever increasing risk when using your mobile device. So, how best to defend yourself?

Start by downloading an anti-malware application (some offering many offering loss/theft protection), like Norton (Android), AVG (Android), Sophos Mobile Security (Android), McAfee (Android, Blackberry, Symbian), Lookout Mobile Security (Android and iPhone) or dozens of iPhone security apps available from the iTunes store. There are also new products like X-Ray for Android, which lets you scan your Android device for vulnerabilities and assess your risk. For more possibilities, you might want to check out Lifehacker’s article, The Best (and Worst) Antivirus Apps for Android, which summarizes the results of tests of various Android anti-virus apps (by AV-Test) and includes an at-a-glance chart.

Speaking of apps and downloading, another tip is to only use apps from a reputable source (like Google or Apple), avoiding free but unofficial versions of popular apps, and to check the permission requested when downloading to see if they make sense for what you’re getting. And get into the habit of backing up your device.

sites/brown.edu.information-technology.knowledge-base/files/3smartphones_w_0.jpgAttevo (a business and IT consulting firm) has compiled a thirteen-point checklist of security habits and usage suggestions [ 2 ] for all smartphone owners, which you should definitely check out. High on the list are a couple rather obvious ones that are still worth following: maintain physical control of your device (4.3% of employee phones are lost or stolen each year) and secure it with a password or passcode [ 3 ].

One final tip: Watch out for phishing, whether it arrives in your InBox or as a text message (SMiShing). These are on the rise and can catch you unaware, especially since it has become second nature to automatically respond to what is usually a short friendly message.

Sources:

  1. US Government Accountability Office (Infosecurity Magazine, 9/24/2012)
  2. Smartphone Security Checklist  (Help Net Security, 3/20/2012)
  3. The Lost Smartphone Problem (Ponemon Institute / McAfee, October 2011)

See also: Build Up Your Phone’s Defenses Against Hackers (NY Times, 1/26/2012)

This article is:

Note: All visitors can mark pages Helpful or Incorrect. If you log in with a Brown username and password, you will also have the ability to save articles as Favorites and send us detailed feedback.