Zephyrnet Logo

The Age of Mobile Computing: 12 Steps to Protect Your Device

Date:

Reading Time: 3 minutes

Update: check the latest version of Comodo’s free mobile security app

.store br{display:none;}

Itune App Store
Google Play Badge

laptop stolen
Mobile devices are becoming ubiquitous. You can see that every day if you stroll the streets of any city or town, with people talking and texting merrily as they go.

The facts support it too, enough to say that we are now in the early years of  the “Age of Mobile Computing”.

  • According to a January 2014 Pew Research, 55% of Americans own Smartphones and 48% own Tablet computers.
  • Research firm comScore reported in May of 2014 that 56% of online content is now consumed via smartphones (44%) and tablets (12%) while just 44% is consumed on desktop computers.

These stats don’t even count laptops and notebook computers which are by definition mobile! Since mobile devices are becoming increasing more important in how we conduct our business and our lives, we need to pay more attention on how we protect and secure them.  Here are 12 steps for keeping your precious device safe:

12 Steps to Protect Your Device

  • Delete what you do not need
  • Backup what you do need
  • Store Data in the Cloud
  • Use Encryption
  • Use a VPN for Browsing
  • Backup critical information
  • Use the Phones Lock Features
  • Use the security lock code, or PIN feature, to lock your phone
  • Use Anti-theft Software
  • Be Discreet
  • Maintain a routine where you always know where your phone is
  • Label Your Phone
  • Delete what you do not need. Remove personal data or business documents that you do not need to be carrying around with you.
  • Backup what you do need. Backup all data that you would miss if lost.
  • Store Data in the CloudCloud storage can give you the best of all worlds, mobility and security protection.
  • Use Encryption.   Use digital certificates to protect documents and email.
  • Use a VPN for Browsing:  You can prevent hackers from snooping into your browsing by using a Virtual Private Network. There are subscription and free services such as the advertising supported version of AnchorFree,
  • Backup critical information. All business critical information should be copied to an alternate location.
  • Use the Phones Lock Features: Phones provide a lock code or PIN for locking a phone. If a thief steals the phone it will be useless.
  • Use the security lock code, or PIN feature, to lock your phone. This will make it less valuable to a thief and deny them access to personal numbers stored on your SIM card.
  • Use Anti-theft Software:  Antitheft features to take advantage of include the ability to have the phone send you its GPS location and the ability to have the phone take and send a photo so you might see its location.  Refer to Comodo Mobile Dev
  • Be Discreet: When you use your phone in a public place you may be inadvertently sending an invitation to steel to a thief in the neighborhood.
  • Maintain a routine where you always know where your phone is.  If you take your phone out of your pocket at home or work, always put it in the same place. If you take it out of your pocket in your car, always place it in a special tray of some kind, and never leave it on the seat. When it is with you, always keep it in the same pocket. Beware of putting it in a jacket pocket where you might forget where it is.
  • Label Your Phone: Label your phone with information that personally identifies it as your phone including info to return a lost phone such as an alternate phone number. It is best to label it in a way that it is not easy for a thief to remove. An ultra violet pen is a great idea!

Related Resources

Android Device Manager

TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE Source: https://blog.comodo.com/mobile-security/age-mobile-computing-12-steps-protect-device/

spot_img

Latest Intelligence

spot_img