Blog

Tip of the Week: 7 Ways to Secure Your Smartphone

b2ap3_thumbnail_security_for_smartphones_400.jpgSmartphones may have been some of the first Internet-connected mobile devices, but they are still as vulnerable to attack as ever. This is especially true for those who forsake any sort of mobile device security policy. With modern businesses utilizing mobile devices, it’s more important now than ever before to have solid security practices in place.

A hacker or worse can easily access the personal or company information located on a mobile device if you do nothing to keep them out. Thankfully, there are several methods you can use to keep unwanted eyes off of your mobile device’s data:

Lock Out Strangers with a Lock Code
This should be a given. Without a passcode on your phone, anyone with physical access to your device can obtain whatever is on it, be it personal information, company data, or even your family’s home address. This is not information you want to share with any potentially malicious entity, both in the virtual world or the material world.

Encrypt your Data
Most smartphones and tablets allow you to encrypt your entire device so your data can't be read if a user doesn't have a password. This makes it much harder for someone to steal and sell your information.

Prevent Websites from Tracking Your Browsing
When you are browsing a website, that website is collecting information from your device to provide you with advertisements based on your interest. While this works (sometimes), you probably don’t want to accidentally leak unwanted information about your person to the Internet. By selecting the Do Not Track option in your mobile device’s browsing settings, you are asking websites to not collect information from you. While this doesn’t always work, most websites will adhere to your preference.

Avoid Calls from Unknown Numbers
You might remember being called by anonymous numbers that you’ve never seen before and listening to automated messages from some company you don’t care about. These are a waste of time, and annoying. Even when there is someone on the other end, they are usually trying to sell you some meaningless service. Other times, they might have more malicious intentions. The stranger on the other end may be posing as a bank representative to steal sensitive information from you without you realizing it. In these cases, it’s better to not say anything, and in some cases, not answer the phone at all.

Find Lost Devices with GPS Tracking
If you have lost your device, there’s a good chance that nobody will find it… but there’s also a chance that someone will find it. What if that person were a hacker, or someone with less-than-pleasant motives? In this case, don’t forget that you can track your phone via GPS. Both Android and iOS offer services which can help you lock down your phone and even find it with GPS tracking.

Add Contact Information to Your Device
Unfortunately, locking down your phone won’t help a good samaritan who finds your phone and wants to return it to you. In case you are somehow unable to locate it with GPS, and your phone is found by a decent human being, you should include at least some information about how to return it to you. Just be careful not to leave too much information in it, or you might risk being the target of identity theft or worse.

Keep Your Device on Your Person
Obviously the best way to avoid any of these scenarios is to keep good track of your device. If you don’t lose your phone, the chances of someone else getting their hands on it are greatly diminished.

Try a Mobile Device Management Solution from White Mountain IT Services
These tips only really apply to physical threats, but virtual threats are just as deadly to your mobile device. White Mountain IT Services can help you whitelist and blacklist allowed applications on your company’s mobile devices, and even set you up with content filtering and spam blocking to keep your team from accessing infected sites or emails, even while mobile.

White Mountain IT Services can also equip your business with a Virtual Private Network (VPN) solution, which helps your mobile team always stay connected to a secure network. For more information about how to keep your company’s devices and data secure while on the move, give us a call at 603-889-0800.

Related Articles

  • IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...
  • Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
  • Tip of the Week: Easy to Remember Tricks for Windows 10 Working with your computer for so much of the day means you need to get as much productivity out of it as possible. If you can speed up some of the ways you access specific information, you can get even more done. Shortcuts are very helpful to this end. Here are some of the easiest and best ways you...
  • Is a Better Camera a Good Reason to Buy a Smartphone? Today the smartphone camera has become one of the biggest selling points when consumers look to purchase a new phone. This is largely because it is crucial to the use of many of the applications that your average user uses the smartphone for. It just goes to show that in less than two decades how mu...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
  • Tip of the Week: Who Should Have Admin Accounts? Depending on their work roles within your organization, your employees will either have an ordinary user account or an administrator account. This can be one of the more stressful parts of managing a network, as the answer for who gets administrator access isn’t always clear. We’ll explain what an a...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions