We no longer rely on our phones for just calling friends or family. With modern smartphones we can do a wide range of tasks; everything from browsing the Internet and paying your bills to checking your bank statement and accessing work emails. Because smartphones are so advanced many of the security issues we’re exposed to through our computers now exist on our smartphones.
Smartphone loss or theft - Losing a device to mishap or theft can cause lost productivity and/or data loss.
Loss of sensitive data - Many smartphones contain sensitive or confidential information, from usernames and passwords, personal photographs and videos, business and personal email messages and text messages to application data and files.
Malicious software - Viruses, Trojan Horses, and Worms are familiar threats to traditional computers. While smartphones have not yet become a significant target, it is expected that this will change over time, especially as more business and financial activity is conducted online using smartphones.
Unauthorised network access - Because many mobile devices provide a variety of network connectivity options, they could potentially be used as a stepping stone to attack corporate systems.
Set your phone to lock, or time out, after a certain period of inactivity, requiring a pass code to get back in.
Only install applications on your smartphone from trusted sources.
Set your phone to wipe its data if someone continues to attempt to guess your smartphone pass code, if this feature is supported.
Pay close attention when installing applications to see if it requires permission to information on your phone. If this is the case, ensure that the permission requested seems reasonable based on the type of application you are installing.
Encrypt the information stored on your smartphone if this option is available.
• Enable a pass code to use your smartphone and set it to auto-lock after a few minutes of inactivity.
• Backup your data using recovery software, usually supplied with the device.
• Set your phone to wipe its data after a set number of incorrect pass code attempts, if this feature is supported.
• Carefully consider the source of any applications you download.
• Carefully consider the permission to your data required by any application you install.
• Wherever possible, prevent sensitive data from being stored on your smartphone devices in the first place.
• Encrypt the data on your smartphone where possible.