Pages Menu
Categories Menu

Posted by on Oct 4, 2012 in Mobile |

5 tips to enjoy our mobile devices more safely

5 tips to enjoy our mobile devices more safely

Smartphones and tablets have become a very important tool in our daily life because we provide access to our corporate email, our files on Dropbox, publications of our friends on Facebook or connection requests we receive through LinkedIn. Considering the amount of personal data and professional we can store in our mobile devices, it is vital to preserve this information so that it is not accessible by third parties (with not so good intentions).

A few months ago, during a train ride, really caught my attention was the person sitting right in front of me because, for a while, was using the Android app of your bank and exchanged several messages via WhatsApp using a terminal that only “security measure” had was the key lock (not used nor password unlock pattern). Cases like this, unfortunately, occur too often and, if we do not take appropriate measures, the risk of information leakage via our mobile devices can be high.

What can we do to improve the safety of our mobile devices? Being aware of the information we store is a first step to embrace some practices that result in better protection of the information we store in our smartphones and tablets and also help us to prevent any type of malware or fraud.

Blocks access to terminal

One of the “bad practices” that we mentioned at the beginning is the lack of a password that prevents a third party to access your phone data (ranging from personal emails and / or professionals to confidential documents).

The keypad lock does not provide any protection to the user terminal beyond avoid making accidental calls to keep the terminals in your pocket and, to ensure the confidentiality of our information, it is important to set the password entry (numeric and alphanumeric Android iOS) or by drawing a visual pattern on Android handsets.

In these cases it is important to get away from the “obvious passwords”, ie, number patterns associated with our date of birth (day, month or year) or any other sequence that may be familiar to a third party.

Double check the applications you install

In the case of Android devices, which are used to install application packages directly or repository outside Google Pay, is of vital importance to maintain control over what we install.

And why keep control? The official Google market (Google Play) includes the control mechanisms to fight against malware. It is important, before you install an application, take a look at the comments that have been left by other users and, especially, the access permissions that the application required (if they are excessive and intended to access more data than necessary).

Look at the small details

In the rush is not uncommon for some messages read “diagonal”, ie, without paying too much attention to detail. Among the messages we receive will surely find URLs that invite us to visit and, in the case of being in a malicious email, have some similarity to reference sites (like Google) or, as we sail, we find this type of as unique URLs.

Faced with such cases it is best to close the web page being displayed or delete the message we are reading because, most likely, is that it is a web page or a malicious email.

It works in case of loss or theft

Given that we had a considerable number of hours per day pending our smartphone, it is not unusual that we forget at the table of a restaurant or cafe, in a taxi while we are paying the race or in an oversight, a “Friend of the foreign” rob us.

In these cases, besides the pain for the loss of data (documents, images, annotations, etc.), we may find ourselves facing a problem if your terminal blocked and was not sufficiently protected (backup files). One way to prevent data theft and even try to recover our terminals is through applications like Prey (available both in iOS and Android ) with which we can operate the camera remotely terminal or remote formatting.

Remember not backup when later

Among the best practices is a must mention the backups of the contents of your mobile device. Although we put effort into caring for our devices and avoid wetting or are affixed to the ground, our tablets and smartphones can fail or we lose (no chance to recover), so it is advisable to perform regular backups and include this practice in of our routine.

Depending on your workflow and use, ie how often they change the data stored on your terminal (messages, contacts, etc), we will have to adjust accordingly the frequency with which we will make copies and, from time to when, as we mentioned occasionally, checking that the copies are done correctly and that they work.

In the case of having a terminal with iOS, the backups will make using iTunes with BlackBerry Desktop Manager can make in the case of having a BlackBerry terminal (or application BlackBerry Protect ) and in the case of Android ( plus management applications from different manufacturers) applications like Super Backup , SMS Backup+ or Backup Master can help us out.