Tap To Call
Facebook NSCTwitter NSCGoogle Plus NSCLinkedin NSCBlog NSC
Call: 713.974.3889

The Security Hole in Your Hand: How to Protect Mobile Devices

For years, we felt as if our mobile devices weren’t the same as our desktops, needing little attention in terms of things like security protections and anti-virus software. But today’s world is one in which mobile devices are no longer safe from bad actors. The question now becomes: What can I do to secure my mobile devices, and keep them safe? Here are a few suggestions.

First, one must take steps to secure devices before even beginning day-to-day use. Follow your manufacturer’s update schedule, as this is where most security holes will be addressed. Make sure you install anti-virus software and keep it updated. Set up the most secure lock screen you can—don’t allow anyone to pick up your phone and start using it immediately. Encryption, VPN, and automatic WiFi restrictions should also be considered.

Next, make sure while in use that you are making common-sense decisions. Using public WiFi is just asking for trouble in many cases, and should be avoided whenever possible. Make sure all data is backed up regularly. And thoroughly research all apps before installing them—the number of innocuous-looking apps and games that contain trojan horses and malware is staggering.

Lastly, take steps to be prepared in case worse comes to worst. Enable location settings, and have a remote wipe solution available if absolutely necessary. Better to lose a device than lose priceless personal data or company IP.

Mobile device maintenance and security become more important each year as these devices gain more and more functionality that enables us to use them as adjuncts to or even replacements for our traditional desktops and laptops. NSC Information Technology Group can answer your questions about mobile device security and how to protect yourself and your business. Contact them to begin securing the devices you use constantly.

This entry was posted in Cyber Security, Network Security. Bookmark the permalink.