Mobile Security


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Mobile Security

  1. 1. Presented by Kevin Lee
  2. 2.  This information is for people that have personal smartphones For people that have company smartphones, contact your companies mobile security policy
  3. 3. Why does a person need to secure asmartphone? As cell phones are becoming more like pocket-sized computers, they are also more vulnerable to different forms of cyber attacks People want your data! This is a fact of life and it applies to either if you have an Android, BlackBerry, or iPhone smartphone
  4. 4. Password Protection By simply enabling a password or PIN number on a cell phone, you can save yourself a tremendous amount of hassle and headache because only you know that unique password You may be able to set a security on the phone so that if someone tries the wrong password a certain number of times, the phone is automatically wiped
  5. 5. Anti-virus Software A person must treat a cell phone like they would a PC by installing and keeping an up to date anti-virus software  Lookout Mobile Security (Android)  SmartGuard Mobile Security (BlackBerry)  iPhones does not have an anti-virus software A security app safeguards your data, protect against threats, and an up-to-date software protects the device from new versions of viruses and new malware
  6. 6. Up-to-date operatingsystem Smartphones need to be patched often to eliminate vulnerabilities found since the phone was first released Updates gets rid of security holes or vulnerabilities by maintaining the software on both your PC and your smartphone
  7. 7. Get apps from a trusted source There are plenty of apps out there, stick to apps from the phones market  Android Play Market  BlackBerry App World  iPhone App Market If you’re downloading an app from a third party, do your research to make sure the app is reputable and will do what you want that app to do
  8. 8. Wi-Fi Network Avoid shopping or banking on a public network  Keep in mind that the open Wi-Fi network that your phone is connected to might not be secure  Limit your activity to browsing and avoid committing any transaction that involves your account information Also, be wary about people looking over your shoulder and seeing your password, e-mails, texts, and account information
  9. 9. Bluetooth devices Although many people think of bluetooth as a better alternative to a physical wire, in fact it creates a personal area network, and like any network, it will recognize appropriate devices within its range A phones bluetooth setting is on by default, so it needs to be turned off, or configured for a specific device or headset
  10. 10. Backup your data If your phone gets taken or the data gets deleted, it’s a lot easier to get your information back when it’s backup regularly It can mean the difference between a slight phone setback or living through your own phone nightmare
  11. 11. Conclusion Doing these simple tips with help keep your phone protected from vulnerabilities that might happen to you  Password Protection  Anti-virus Software  Up-to-date operating system  Get apps from a trusted source  Wi-Fi Network  Bluetooth devices  Backup your data