May 31, 2013
Most business people rely heavily on their smartphones and tablets to help manage their personal and business lives. Which means that we use these devices to transact banking business, make travel plans, send and receive emails, access the Internet and social media sites and even transfer CAD drawings and other customer information. So anyone who gets their hands on the phone, itself, or hacks their way in has access to data that can cause us a world of hurt, as anyone who’s had a brush with identity theft or industrial espionage will tell you.
According to the Federal Trade Commission, mobile cyber attacks increased 367% in 2011 and continue to escalate. With that in mind, it behooves us all to do what we can to protect our devices. A good first step is to visit the FCC’s official Web site to take advantage of their Smartphone Security Checker. This online tool provides a step-by-step program to improve your smartphone’s security, customized to your specific mobile operating system (Apple, Android, Blackberry or Windows).
Many of the FCC suggestions appear to be common sense yet it’s surprising how many of us don’t employ even these basic safeguards. How many of the following mobile security practices do you follow?
Following these and the FCC procedures may not protect your mobile devices against any and all threats, but applying them faithfully can definitely improve your odds.