Secure Your Mobile Devices: Prevent Theft

12/07/2022

Secure Your Mobile Devices: Prevent Theft

Secure Your Mobile Devices: Prevent Theft

While the ease of having a mobile device at your fingertips has greatly improved modern life, many people forget that smartphones can possess the same personal information as a computer. This makes them a frequent target of cybercriminals and thieves. Keep reading for helpful information and tips to safeguard your mobile device.

PHYSICAL THEFT

The best way to prevent data theft is to prevent physical theft. A good rule of thumb is to always take your device with you and to never let a stranger handle your phone, even in your presence. Sometimes it can be difficult to have your phone on you; for those times, here is a list of ways to prevent physical theft:

  1. Pay attention to your surroundings
  2. Install remote wipe security applications
  3. Choose two-factor authentication with a biometric element
  4. Avoid keeping confidential information on your phone
  5. Install tracking applications

DATA THEFT

The biggest threat to your mobile device is data theft. Threats can come from many different sources.

Apps. Apps can pose a problem for the security of your mobile device. Imitation apps can install malware on your phone that can steal personal and payment information. Apps that offer free deals should be considered suspicious. It is important to carefully read reviews and research any app you download. You should also delete apps you no longer use.

Public Wi-Fi. Another way criminals can infiltrate your mobile device is through unsecured public Wi-Fi. It is important to avoid online shopping, conducting sensitive business, and providing personal information to websites that are unencrypted. In public, you might choose to use a virtual private network (VPN) that encrypts all incoming and outgoing data. Also make sure to turn off all Bluetooth and file sharing while in public, and always try to visit HTTPS addresses.

Social Engineering. Social engineering is when an individual uses deceptive tactics to manipulate individuals into giving out sensitive information to be used for fraudulent purposes. Social engineers will contact you through text, over the phone, and on social media. They can also attempt phishing attacks in emails. It is important to never open a link, no matter how it is sent, without verifying the identity of the sender. If the link comes from a business or service provider, it is usually good practice to go to the company’s website and call the secure line to communicate.

REPORTING THEFT

If your phone is lost or stolen, it is extremely important to report it to the correct authorities. They will be your best avenue for recovering the mobile device or data kept on it. If the device is a work phone, be sure to report the loss to your company immediately. This way they can make sure to safeguard from any data theft that may occur on the company’s servers. You should also report the loss to your service provider. They can cancel the phone’s service and may even be able to help police locate the device. Most importantly, you should report any stolen devices to the police. It is always best to write down your smartphone’s identifying information. Write down the make, model number, serial number, and either the International Mobile Equipment Identifier (IMEI) or the Mobile Equipment Identifier (MEID). You can find this information on the phone’s box or on the phone’s battery.

GOOD PHONE HABITS

  • Never alter built-in security settings
  • Always do system updates
  • Disable camera, microphone, and location tracking when not in use
  • Regularly back up data
  • Wipe all data before selling, recycling, or donating your device
  • Disable automatic Wi-Fi connect
  • Buy a case that covers the microphone
  • Do not use public charging stations

Being aware of the potential risks to the security of your mobile device is half the battle. The good news is that with a little know-how and care your phone can remain secure.

https://www.fcc.gov/sites/default/files/smartphone_master_document.pdf

https://www.fcc.gov/consumers/guides/mobile-wallet-services-protection

https://www.fcc.gov/consumers/guides/protect-your-mobile-device

https://www.sba.gov/blog/10-ways-keep-your-mobile-devices-data-them-more-secure

View All Posts