Smart Hustle Magazine - join the community and get your FREE subscription. Click here to join!

5 Tips Every Mobile Professional Needs To Keep Their Smartphone Secure

Brought to you by AVG Technologies, the provider of Internet and mobile security, privacy and optimization to 150 million active users. There’s nothing small about small business in our eyes. Get more information how AVG can help your small business simplify IT management – go to http://www.avg.com/cloudcare/us-en/homepage.html.

 

5 Tips Every Mobile Professional Needs To Keep Their Smartphone Secure

Mobile security is one of those things that many business owners don’t really want to talk about because they don’t see it as a major problem. This is exactly the kind of attitude that’s going to breed new types of threats added to the ones we already have. The importance of mobile security is difficult to fathom specifically because phones really didn’t have any danger of being hacked until recently.

The truth is that the tiny device you hold in your hand is in as much danger of being breached as your PC. Some would argue that mobile devices actually present an even bigger danger because of their physical portability. Since they’re small, you are able to take them with you wherever you go, making you easily capable of losing them. You can’t imagine that same thing happening to your desktop PC that sits neatly in your office.

Businesses are often quick to underestimate the impact that a data breach could have on a phone or a tablet. Your phone most likely stores your login sessions, passwords, digital wallets, and daily use applications. It’s a tiny storage place for all your personal information. If you leave a phone like that without any security, you’re putting something in your pocket every morning that leaves you openly exposed. Even if no one steals your phone, you’re probably also using the Wi-Fi network in your local coffee shop to log in to social networks like Facebook and Twitter, which can be sniffed by someone who’s also connected to the same network via another wireless device.

Exposing yourself is quite easy. On the other hand, shielding yourself from such exposure takes a little know-how:

  • Get an app that can remotely wipe and locate your phone or tablet. Do this also for your employees. In case you or your employees ever lose your devices, the only thing standing between someone else’s hands and all the personal data in them is just thin air, literally. The best defense against this is the ability to wipe all the data from the phone as soon as you notice it’s missing.
  • Password-protect devices. It may be a little annoying to type a password every time you activate your phone’s screen, but this method will give you plenty of time to do something about your lost phone before a perpetrator has any chance of getting access to what’s inside it.
  • Do not modify your smartphones security settings. Also, discourage employees from doing this to the devices they bring to work. Jailbreaking, rooting, or tampering with the security settings undermines built in security features, which  make the device more vulnerable to malware.
  • Install an antivirus product and keep it up to date. Having the most updated antivirus software on your smartphone keeps it one step ahead of any malware that can creep in even from the most trusted sources.
  • Make sure that your phone is in a pocket or bag that’s secure and close to your body at all times. Don’t let the device leave your sight!

Let’s not forget that one of the top reasons for data compromise in smartphones is the user’s behavior and gullibility. Keep an eye out for signs of things that can’t be trusted. For example, an Android app that doesn’t come from Google Play should be looked at with scrutiny. If a site directs you somewhere else, consider it a red flag. Don’t forget to pass this information along to any employees. When you open your eyes and read between the lines of everything your mobile device does, keeping it secure becomes more simple!

 

avatar

About Ramon Ray

Ramon Ray, Marketing & Technology Evangelist, Smallbiztechnology.com & Infusionsoft. Full bio at http://www.ramonray.com . Check him out on Google Plus, Twitter or Facebook

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>