SlideShare a Scribd company logo
1 of 2
Download to read offline
Smartphone Smart Card Smartphone 061013_1600
Smartphone -Do’s and Don’ts
 Malicious individuals may gain physical access to your smartphone. Protect your device with a password and run apps such as Android
Lost and Find My iPhone to help you recover lost or stolen smartphones.
 Malicious emails and text messages can infect your smartphone with malware. Run anti-virus software periodically on your device.
 The camera and microphone can be remotely activated. Do not take a smartphone near classified information, and remove the battery
before discussing any sensitive information.
 Wireless networks may be insecure and subject to monitoring. Use VPN when accessing wireless networks, and do not access sensitive
information over wireless networks. Turn off Bluetooth when you are not using it to prevent hackers from exploiting your device.
 Apps that you download may gain access to the data stored on your smartphone. Check to see if the app will access your personal data
and read user reviews of the app to see if other users experienced trouble after downloading.
 Apps can track your location. Turn off location services to avoid unwanted location tracking.
Physical Access and Malware Threats
Use the following settings and recommendations to minimize security risks posed by your smartphone and protect your personal data.
Threat iPhone 6.1.3 Android 4.1.2
Physical Access Threats – To prevent
others from accessing data on your
smartphone, set up a passcode to
protect your information. Android
has multiple passcode styles
including pattern, PIN, password, and
face recognition while the iPhone
uses alpha-numerical codes and PINs.
Lost or Stolen Phones - It is reported
that on average 113 cell phones will
be stolen every minute in the United
States. Download apps such as Find
My iPhone or Android Lost to locate,
lock, or control your data remotely.
These apps allow users to manage
data on their smartphones from
internet webpages accessed via
desktop or portable device.
Find My iPhone (Free) Android Lost (Free)
Malware – Your smartphone is
vulnerable to malware from emails,
websites, and downloaded apps.
Between 2011 and 2012 alone,
smartphones had an increase in
malware attacks by over 1,200% with
Android being the most susceptible.
Download third-party security apps
such as Virusbarrier and AVG’s
Antivirus Security to prevent malware
from stealing your information.
Virusbarrier ($0.99) Antivirus Security (Free)
By AVG
Best Practices
 Updates for smartphones’ operating systems are sent out frequently. Install the updates immediately to maximize your protection.
 Jailbroken phones allow malicious apps to bypass vetting processes taken by the app stores. Never jailbreak your smartphones.
 Write down the manufacturer and the serial number of your phone when it is purchased to help identify devices if lost or stolen.
 Avoid linking social networking services like Facebook and Twitter to your smartphones to prevent personal information aggregation.
 Change passwords on your phone frequently (approximately every 6 months) to maximize security.
Optional Setting
Create a complex
password containing
letters and numbers
Navigate Settings >
General > Passcode Lock
Block Access
Navigate Settings >
Security > Screen Lock
Uncheck
Use a password or
pattern. Avoid using
face recognition.
Capabilities:
 Remote Lock
 Erase Data
 GPS Locator
 Sound Alarm
 Send Text
Message to Phone
 Backup Data
Through iCloud
Storage
Capabilities:
 Remote Lock
 Erase Data
 GPS Locator
 Sound Alarm
 Send Text
Message to Phone
 Activate Camera
 Read Texts Sent
 View Call List
iPhones are not readily
susceptible to viruses.
Use this app to prevent
passing malware to
your contacts.
Capabilities:
 Scan for spyware,
adware, and Trojans
 Scan emails and PDF
files before sending
Capabilities:
 App Scanner
 File Scanner
 Website Scanner
 Text and Call
Blocker
 Remote Lock
 Erase Data
Remotely
 GPS Locator
 Kill Slow Tasks

Always auto-lock
your devices
Smartphone Smart Card Smartphone 061013_1600
Wireless Connections and App Security Settings
Threat iPhone Android
Wireless Networks – Information
transmitted via public Wi-Fi
networks can be intercepted by third
parties. Avoid using public wireless
networks when possible and always
use a VPN client to encrypt your
online transactions.
Bluetooth – Bluetooth involves the
wireless communication of two
devices within a close proximity.
When Bluetooth is enabled, hackers
may be able to access the
connection to your device and
retrieve your contacts, calendars,
emails, messages, and photos
without your knowledge. Avoid using
Bluetooth and disable it when it is
not being used.
Data Retaining Apps – Downloaded
applications frequently collect users’
personal information to sell to third
party data aggregators. Native
applications such as Siri and Google
Now will also collect data from users
which may include name, email
address, credit card numbers,
contacts, and device information.
These services also record and
catalogue the audio during sessions.
Avoid using these voice recording
services.
Location Threats – The majority of
apps will ask permission to track
your current location. Users should
avoid granting permission to these
apps when possible and turn off all
location tools when they are not in
use. It is also important to note that
pictures taken with smartphones
retain location information within
EXIF data. Never upload pictures
taken from your smartphone to
social networking sites.
Smartphone Useful Links
A Parent’s Guide to Internet Safety www.fbi.gov/stats-services/publications/parent-guide
Microsoft Safety & Security www.microsoft.com/security/online-privacy/social-networking.aspx
OnGuard Online www.onguardonline.gov/topics/social-networking-sites.aspx
Privacy Rights Clearinghouse www.privacyrights.org/fs/fs2b-cellprivacy.htm#smartphonedata
www.novetta.com
Navigate Settings > Wi-Fi
Disable Wi-Fi when
not in use
Enable Network
Permissions
Navigate Settings > General > VPN to enable
and establish a VPN connection
Navigate Settings > Wi-Fi to manage connections
Navigate Settings > More > VPN to enable
and establish a VPN connection
Navigate Settings > More > Tethering & Portable
Hotspot and disable Portable Wi-Fi Hotspot
Disable Wi-Fi when
not in use
Navigate Settings > Bluetooth to disable services
Navigate Settings > More > NFC to manage Near
Field Communications settings which can be used
to transfer data via touching devices together.
Disable Bluetooth
when not in use
Uncheck
Navigate Settings > Bluetooth to disable services
Disable Bluetooth
when not in use
Navigate Settings > Personal Hotspot to disable
broadcasting a personal internet connection.
Never share your
internet
connection
Navigate Settings > General > Siri
Navigate Settings > Privacy > Location Services
Disable Siri
Navigate Settings > Privacy to view and manage
which apps are using specific information.
Only grant access
to apps that
require a location
to function
Disable location
services when
not in use
Turn Off
Navigate Settings > Location Access
Uncheck when
location services
are not in use
Only grant access
to apps that
require a location
to function
Navigate Settings > Apps and review individual
apps to see what information is being collected
Delete apps that take
information you
don’t approve
Uncheck

More Related Content

What's hot

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 

What's hot (20)

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 

Viewers also liked

A web como recurso didáctico
A web como recurso didácticoA web como recurso didáctico
A web como recurso didácticoCarlos Cathedra
 
Professional Certificate
Professional CertificateProfessional Certificate
Professional Certificatewasim ahmed
 
Copy of How to Use Social Media to Fuel Your Growth
Copy of How to Use Social Media to Fuel Your GrowthCopy of How to Use Social Media to Fuel Your Growth
Copy of How to Use Social Media to Fuel Your GrowthMark Cohen
 
Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016LibreCon
 
Marka baten eraikuntza: Nerón autoeskolak
Marka baten eraikuntza: Nerón autoeskolakMarka baten eraikuntza: Nerón autoeskolak
Marka baten eraikuntza: Nerón autoeskolakUnai Garmendia
 
Resume of zahir hussain
Resume of zahir hussainResume of zahir hussain
Resume of zahir hussainZahir Hussain
 
We’re the world
We’re the worldWe’re the world
We’re the worldshema12345
 
Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010
Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010
Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010Cloudera, Inc.
 
Aircraft Cargo Winch – Cunico
Aircraft Cargo Winch – CunicoAircraft Cargo Winch – Cunico
Aircraft Cargo Winch – CunicoCunicoCorp
 
Lenguaje cuadro comparativo rosmar perez
Lenguaje   cuadro comparativo rosmar perezLenguaje   cuadro comparativo rosmar perez
Lenguaje cuadro comparativo rosmar perezRosmar Perez
 
LMHS PowerPoint March 2015
LMHS PowerPoint March 2015LMHS PowerPoint March 2015
LMHS PowerPoint March 2015gpwoodburn
 
Ethics & Social Responsibility
Ethics & Social ResponsibilityEthics & Social Responsibility
Ethics & Social ResponsibilityVisakhapatnam
 

Viewers also liked (13)

A web como recurso didáctico
A web como recurso didácticoA web como recurso didáctico
A web como recurso didáctico
 
Professional Certificate
Professional CertificateProfessional Certificate
Professional Certificate
 
Copy of How to Use Social Media to Fuel Your Growth
Copy of How to Use Social Media to Fuel Your GrowthCopy of How to Use Social Media to Fuel Your Growth
Copy of How to Use Social Media to Fuel Your Growth
 
Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016
 
Marka baten eraikuntza: Nerón autoeskolak
Marka baten eraikuntza: Nerón autoeskolakMarka baten eraikuntza: Nerón autoeskolak
Marka baten eraikuntza: Nerón autoeskolak
 
Resume of zahir hussain
Resume of zahir hussainResume of zahir hussain
Resume of zahir hussain
 
We’re the world
We’re the worldWe’re the world
We’re the world
 
Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010
Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010
Membase, ShareThis, AOL - Phillips, Mukerji, Jackson - Hadoop World 2010
 
Aircraft Cargo Winch – Cunico
Aircraft Cargo Winch – CunicoAircraft Cargo Winch – Cunico
Aircraft Cargo Winch – Cunico
 
Lenguaje cuadro comparativo rosmar perez
Lenguaje   cuadro comparativo rosmar perezLenguaje   cuadro comparativo rosmar perez
Lenguaje cuadro comparativo rosmar perez
 
LMHS PowerPoint March 2015
LMHS PowerPoint March 2015LMHS PowerPoint March 2015
LMHS PowerPoint March 2015
 
Ethics & Social Responsibility
Ethics & Social ResponsibilityEthics & Social Responsibility
Ethics & Social Responsibility
 
Leverages
LeveragesLeverages
Leverages
 

Similar to Smartphone Smart Card 061013

Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?XNSPY
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 

Similar to Smartphone Smart Card 061013 (20)

Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Mobile security
Mobile security Mobile security
Mobile security
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 

More from McAlester Army Ammunition Plant (6)

Photo Sharing Services Smart Card 060513
Photo Sharing Services Smart Card 060513Photo Sharing Services Smart Card 060513
Photo Sharing Services Smart Card 060513
 
Twitter Smart Card 070314
Twitter Smart Card 070314Twitter Smart Card 070314
Twitter Smart Card 070314
 
LinkedIn Smart Card 070314
LinkedIn Smart Card 070314LinkedIn Smart Card 070314
LinkedIn Smart Card 070314
 
Google+ Smart Card 070314
Google+ Smart Card 070314Google+ Smart Card 070314
Google+ Smart Card 070314
 
Facebook Smart Card 070314
Facebook Smart Card 070314Facebook Smart Card 070314
Facebook Smart Card 070314
 
2016 02 USAJOBS application process changes~996
2016 02 USAJOBS application process changes~9962016 02 USAJOBS application process changes~996
2016 02 USAJOBS application process changes~996
 

Recently uploaded

9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 

Recently uploaded (20)

Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 

Smartphone Smart Card 061013

  • 1. Smartphone Smart Card Smartphone 061013_1600 Smartphone -Do’s and Don’ts  Malicious individuals may gain physical access to your smartphone. Protect your device with a password and run apps such as Android Lost and Find My iPhone to help you recover lost or stolen smartphones.  Malicious emails and text messages can infect your smartphone with malware. Run anti-virus software periodically on your device.  The camera and microphone can be remotely activated. Do not take a smartphone near classified information, and remove the battery before discussing any sensitive information.  Wireless networks may be insecure and subject to monitoring. Use VPN when accessing wireless networks, and do not access sensitive information over wireless networks. Turn off Bluetooth when you are not using it to prevent hackers from exploiting your device.  Apps that you download may gain access to the data stored on your smartphone. Check to see if the app will access your personal data and read user reviews of the app to see if other users experienced trouble after downloading.  Apps can track your location. Turn off location services to avoid unwanted location tracking. Physical Access and Malware Threats Use the following settings and recommendations to minimize security risks posed by your smartphone and protect your personal data. Threat iPhone 6.1.3 Android 4.1.2 Physical Access Threats – To prevent others from accessing data on your smartphone, set up a passcode to protect your information. Android has multiple passcode styles including pattern, PIN, password, and face recognition while the iPhone uses alpha-numerical codes and PINs. Lost or Stolen Phones - It is reported that on average 113 cell phones will be stolen every minute in the United States. Download apps such as Find My iPhone or Android Lost to locate, lock, or control your data remotely. These apps allow users to manage data on their smartphones from internet webpages accessed via desktop or portable device. Find My iPhone (Free) Android Lost (Free) Malware – Your smartphone is vulnerable to malware from emails, websites, and downloaded apps. Between 2011 and 2012 alone, smartphones had an increase in malware attacks by over 1,200% with Android being the most susceptible. Download third-party security apps such as Virusbarrier and AVG’s Antivirus Security to prevent malware from stealing your information. Virusbarrier ($0.99) Antivirus Security (Free) By AVG Best Practices  Updates for smartphones’ operating systems are sent out frequently. Install the updates immediately to maximize your protection.  Jailbroken phones allow malicious apps to bypass vetting processes taken by the app stores. Never jailbreak your smartphones.  Write down the manufacturer and the serial number of your phone when it is purchased to help identify devices if lost or stolen.  Avoid linking social networking services like Facebook and Twitter to your smartphones to prevent personal information aggregation.  Change passwords on your phone frequently (approximately every 6 months) to maximize security. Optional Setting Create a complex password containing letters and numbers Navigate Settings > General > Passcode Lock Block Access Navigate Settings > Security > Screen Lock Uncheck Use a password or pattern. Avoid using face recognition. Capabilities:  Remote Lock  Erase Data  GPS Locator  Sound Alarm  Send Text Message to Phone  Backup Data Through iCloud Storage Capabilities:  Remote Lock  Erase Data  GPS Locator  Sound Alarm  Send Text Message to Phone  Activate Camera  Read Texts Sent  View Call List iPhones are not readily susceptible to viruses. Use this app to prevent passing malware to your contacts. Capabilities:  Scan for spyware, adware, and Trojans  Scan emails and PDF files before sending Capabilities:  App Scanner  File Scanner  Website Scanner  Text and Call Blocker  Remote Lock  Erase Data Remotely  GPS Locator  Kill Slow Tasks  Always auto-lock your devices
  • 2. Smartphone Smart Card Smartphone 061013_1600 Wireless Connections and App Security Settings Threat iPhone Android Wireless Networks – Information transmitted via public Wi-Fi networks can be intercepted by third parties. Avoid using public wireless networks when possible and always use a VPN client to encrypt your online transactions. Bluetooth – Bluetooth involves the wireless communication of two devices within a close proximity. When Bluetooth is enabled, hackers may be able to access the connection to your device and retrieve your contacts, calendars, emails, messages, and photos without your knowledge. Avoid using Bluetooth and disable it when it is not being used. Data Retaining Apps – Downloaded applications frequently collect users’ personal information to sell to third party data aggregators. Native applications such as Siri and Google Now will also collect data from users which may include name, email address, credit card numbers, contacts, and device information. These services also record and catalogue the audio during sessions. Avoid using these voice recording services. Location Threats – The majority of apps will ask permission to track your current location. Users should avoid granting permission to these apps when possible and turn off all location tools when they are not in use. It is also important to note that pictures taken with smartphones retain location information within EXIF data. Never upload pictures taken from your smartphone to social networking sites. Smartphone Useful Links A Parent’s Guide to Internet Safety www.fbi.gov/stats-services/publications/parent-guide Microsoft Safety & Security www.microsoft.com/security/online-privacy/social-networking.aspx OnGuard Online www.onguardonline.gov/topics/social-networking-sites.aspx Privacy Rights Clearinghouse www.privacyrights.org/fs/fs2b-cellprivacy.htm#smartphonedata www.novetta.com Navigate Settings > Wi-Fi Disable Wi-Fi when not in use Enable Network Permissions Navigate Settings > General > VPN to enable and establish a VPN connection Navigate Settings > Wi-Fi to manage connections Navigate Settings > More > VPN to enable and establish a VPN connection Navigate Settings > More > Tethering & Portable Hotspot and disable Portable Wi-Fi Hotspot Disable Wi-Fi when not in use Navigate Settings > Bluetooth to disable services Navigate Settings > More > NFC to manage Near Field Communications settings which can be used to transfer data via touching devices together. Disable Bluetooth when not in use Uncheck Navigate Settings > Bluetooth to disable services Disable Bluetooth when not in use Navigate Settings > Personal Hotspot to disable broadcasting a personal internet connection. Never share your internet connection Navigate Settings > General > Siri Navigate Settings > Privacy > Location Services Disable Siri Navigate Settings > Privacy to view and manage which apps are using specific information. Only grant access to apps that require a location to function Disable location services when not in use Turn Off Navigate Settings > Location Access Uncheck when location services are not in use Only grant access to apps that require a location to function Navigate Settings > Apps and review individual apps to see what information is being collected Delete apps that take information you don’t approve Uncheck