We've discussed various security issues that can affect our business, from Phishing to Ransomware. We've also talked about how to work more securely with our passwords , but this time we want to focus on the use of our mobile devices and the dangers they can pose when used without proper security measures or without considering certain threats we may face.
We all know that today, our phones are an extension of ourselves. In many cases, we have both a personal and a work device, or even both in one. The advantages are clear: access to email and company services at any time, the ability to perform certain tasks directly from our devices, and so on.
The problem is that in many cases, we focus on the security of workstations and completely forget that our phones carry the same or even greater risks than our computers. These devices can access data and services that can compromise the integrity of our businesses.
What are the security risks of mobile devices?
There are many things that can affect the security of our phones, including connecting to "Free WiFi" networks, which we will discuss in a separate article. It is widely known that many attackers use WiFis they created and shared themselves. When someone connects to these networks, attackers can obtain their accounts and passwords, and access the phone and its content. For this reason, among others, we should equip our phones with a VPN and avoid connecting to "Free WiFi" networks, as we never know who might be monitoring our data.
To have the most secure device possible, we should always have the latest version installed. Updating the phone is important because these updates ensure we have the latest security patches and features, which are designed to fix security and utility issues that the software and device may have.
When installing applications, we should only do so from the Play Store (for Android) or the Apple Store (for iOS). Installing apps from any other source is not a good idea, as it does not guarantee that the app has passed any security checks, and we might be installing malware without realizing it.
It is also recommended not to have both WiFi and Bluetooth active on our devices unless we are using them. This simple measure can help prevent certain problems, as it can prevent our devices from connecting to fake access points and seemingly trustworthy networks, from which our devices can be monitored.
More Tips for Mobile Device Security
It is important to have an updated antivirus on our mobile devices, such as Kapersky, AVG or any of the other available options, both free and paid. This will protect us from certain threats and make our devices more secure.
Of course, it is essential that our device is protected with a password, fingerprint, or pattern, so that in case of loss or theft, the data is not accessible to anyone other than the user. But what should we do in case of loss or theft of the device?
If our mobile device has been stolen or lost, it is important to take quick action to minimize risks and try to recover the device. Here are some steps we should follow:
- Lock the phone: The first thing you should do is lock the phone. If you have an iPhone, you can do this using iCloud's "Find My iPhone" feature. If you have an Android phone, you can lock it using Google's "Find My Device" feature.
- Change your passwords: Change the passwords for all your online accounts, including email, social networks, and bank accounts, to prevent someone from accessing your personal or company information.
- Report the theft: Report the theft to the local police and your mobile service provider. Provide the phone's serial number, IMEI, and any other relevant information.
- Call your mobile service provider: Call your mobile service provider to inform them of the theft. Ask them to deactivate the SIM card to prevent someone from using your phone number.
- Use tracking tools: If you have a tracking app installed on our phone, which we recommend, use it to try to locate the device.
- Consider remotely wiping your phone: If you cannot recover the phone, you should consider remotely wiping all the device's content. If you have a backup of your data, you can restore it on another phone.
- Keep a record: Make sure to keep a record of all the steps we have taken, including calls to the police and the mobile service provider. This can be helpful if we need to file a claim with our insurance company.
Remember that it is important to act quickly when our device is stolen or lost. If we take immediate action, we have a better chance of recovering the device or preventing someone from accessing our personal or company information.
By following the advice in this article, we will have a more secure device for both our personal use and for the phone provided by our company. Keep in mind that the data on our device can compromise the integrity of our entire business and the security of our personal data. Stay safe!