Protect your mobile device

These days, most people own a smartphone or a tablet, or in many cases, both. They help us stay connected, be more efficient and make it easier to coordinate our busy personal and professional lives. It's easy to take for granted the type of information you're accessing and sharing on these devices, but what may seem to be insignificant information could provide an attacker with an opportunity.

Given that so much information is stored or accessed through our mobile devices, it’s very important to keep these devices secure, which is not difficult to do.

Here are a few simple steps to help you protect your personal and company information:

  • Protect your phone from viruses and malicious software, or malware, just like you do for your computer by installing mobile security software.
  • Watch out for public Wi-Fi. Avoid online shopping, banking or other activities that require use of sensitive information when using public Wi-Fi. Use your mobile network whenever possible.
  • Avoid storing sensitive information like passwords or a social security number on your mobile device. Confidential company or customer information should never be stored on a personal device and only accessed using the appropriate approved tools.
  • Use caution when downloading apps. Apps can contain malicious software, worms, and viruses. Beware of apps that ask for unnecessary permissions, and make sure you’re downloading the company’s authentic app. You can generally find these on their website instead of going through the Apple App Store or Google Play.
  • Update the software for your phone and mobile apps whenever a new version is released, which may contain critical security updates.
  • Use the passcode lock and thumbprint on your smartphone and other devices. Codes and biometric security of this nature will make it more difficult for thieves to access your information if your device is lost or stolen. Enable the “Find your device” feature, if available.
  • Beware of mobile phishing. Avoid opening links and attachments in emails and texts, especially from senders you don’t know. And be wary of ads (not from your security provider) claiming that your device is infected.
  • Clear your mobile device before you donate, sell or trade it using specialized software or using the manufacturer’s recommended technique.