Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

ITS encourages all users to take action to secure their mobile devices. While much of this article will discuss protecting devices from cybersecurity threats, it is just as important that users also see to the physical security of their devices. 

Mobile devices, given the wealth of sensitive data they hold, can essentially be thought of as informational safes, designed to ensure that contacts, accounts, messages, and even finances are protected from unauthorized access or malicious software. However, unlike a safe, which is typically not carried around in public, users tend to keep mobile devices on their person at almost all times. This tendency renders devices more accessible to cybercriminals, making it that much more imperative important that users are vigilant, wary and keep track of their devices to prevent loss or theft.

Tip
iconfalse

In the event that a mobile device is stolen, the lock screen is its first line of defense. Ensure that all of your mobile devices have a lock screen with either a password, PIN, or biometric lock (i.e., fingerprint scanning, facial recognition, etc) in place. Users can further bolster their devices against threats by using multiple lock screen security tools simultaneously. 

Cybersecurity for Mobile Devices

Mobile devices are more prone to cyber-attacks because:

  • They are easier to misplace or steal.

  • Mobile app development environments are very accessible, which means that almost anyone can develop a malicious app that installs malware on the affected device or steals information.

  • While self-replicating viruses—the most well-known type of malware—are rare (and in Android’s case, nonexistent) on mobile devices, they are still susceptible to other types of malware. Many mobile device users are unaware of this and incorrectly assume that

    the

    built-in device security provides sufficient protection. It does not.

It is thus important that users maintain physical security, combined with rigorous cybersecurity measures, for their mobile devices. This is the most effective way to prevent security threats.

...

The section below describes steps that users can take to protect against the most common types of mobile security threats. 

Info

For more background information about different types of cybersecurity threats, review the article, /wiki/spaces/IKB/pages/10809901143

Network Spoofing 

To prevent cybercriminals from spoofing—i.e., creating false WiFi networks that mimic legitimate ones, you should:

  • Disable the auto-connect feature in your mobile device’s network settings.

  • Check the legitimacy of any network before you connect to it.

Unpatched Vulnerabilities 

...

To protect your mobile device from smishing—i.e., phishing that occurs over SMS instead of via email—you should:

  • Never click on any of the links that may appear in messages from unknown users.

  • Never respond to text messages from unknown users.

  • Be especially wary of texts you receive from unknown users that contain threatening language

    ,

    or convey urgency.

Malicious Apps

Scammers often create fraudulent versions of legitimate apps to gain unauthorized access to devices. To protect your device from malicious apps,

  • Research the app’s developers prior to installing any software.

  • Only download apps from legitimate, verified sources.

  • Review the app’s security settings and permissions carefully. When unchecked, permissions often allow the app to collect more of your device’s data than is necessary for it to actually function.

Viruses and Other Malware

As mentioned above, mobile devices are highly susceptible to viruses and other malware, and it is important to protect against these risks. The best ways to prevent your mobile device from malware are to:

  • Install antivirus and antimalware software.

  • Exercise extreme caution when downloading software (including antivirus/malware programs), clicking links, or tapping on-screen buttons. Remember that both legitimate and malicious software can gather a lot of information about you, your activities on your device, and even other applications without your knowledge.

Protecting Mobile Devices While Traveling 

...

To protect against security breaches while traveling,

...

  • Always keep an eye on your belongings, particularly your mobile devices.

  • Avoid connecting to public WiFi.

  • Use only the power supplies you personally own to charge your mobile devices or transfer data.

  • Do not discuss anything confidential until you ensure that you have privacy.

  • Enable the Find My Device feature on your device so that it can be located if it is lost

    .

...

  • .

...

...

Filter by label (Content by label)
showLabelsfalse
max10
showSpacefalse
cqllabel in (

...

"mobile" , "mobile_devices" , "protect" , "security" , "risk" , "threat" , "virus" , "access" ) and space = "IKB

...

"
Page Properties
hiddentrue


Related issues

Image Modified