Protect Your Mobile Device
Phones and tablets contain a large amount of personal information. Lost or stolen devices can be used to gather information about you and potentially others. Protect your phone like you would your computer. If your phone can browse the web and check email, you have probably already been targeted by the same malicious attacks and scams that go after your computer.
Protect your mobile device
- Use a password on your phone and a PIN on your SIM card. Don’t rely on the default factory settings. Using a password and PIN will deter thieves from accessing your phone or using the SIM in another phone to make calls.
- Set an idle timeout that automatically locks your phone when not in use. This also helps prevent unauthorized individuals from gaining access to your data.
- Keep all software up-to-date, including the operating system and installed apps. This will help protect the device from attacks and being compromised.
- Do not jailbreak or root your device. Jailbreaking and rooting removes the manufacturer’s protection against malware.
- Install apps only from trusted sources such as the Apple iTunes Store or Google Play. This will help you avoid malware which is often distributed via illicit channels.
Install security software
Anti-virus, anti-theft, anti-malware and firewall software are available for some mobile phone operating systems. Make sure to install security software from a reputable provider.
It’s not ‘just a phone’
- Treat your smartphone like your wallet – keep it safe and on your person at all times.
- Remember your smartphone is a computer – all the same security rules apply. This includes checking the authenticity of websites, not clicking on links from people you don’t know, and watching out for phishing scams asking for personal information.
If your mobile device is lost or stolen
Immediately change all passwords for accounts that are accessed on your mobile device, especially email accounts. If someone gains access to the device, they will have access to all your email, social networks and shopping apps until all your passwords are changed.