<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Device Security Tips Archives - CIATEC</title>
	<atom:link href="https://www.ciatec.com/tag/mobile-device-security-tips/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/tag/mobile-device-security-tips/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Sat, 21 Dec 2019 12:34:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>Mobile Device Security Tips Archives - CIATEC</title>
	<link>https://www.ciatec.com/tag/mobile-device-security-tips/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Device Security</title>
		<link>https://www.ciatec.com/2019/12/mobile-device-security/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 21 Dec 2019 11:33:25 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mobile Device Security]]></category>
		<category><![CDATA[Mobile Device Security Tips]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=3277</guid>

					<description><![CDATA[<p>Mobile Device Security Importance of mobile device security &#8211; In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Mobile Device Security<span style="color: #31aaa2;"><br />
</span></h2>
<p><strong>Importance of mobile device security &#8211;</strong> In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile devices.</p>
<p>It is estimated that the number of mobile phone users by 2019 will surpass five billion people around the globe. In addition to the social and economical effects of this massive increase, there is a definite increase in the number of cyber crimes. Cyber criminals have taken advantage of this massive growth and developed methods to take advantage of the increased number of possible targets.</p>
<p>There are many opportunities for cyber-criminals to access their targets: through apps, operating systems and software, and by identifying and taking advantages of defects in security before the programmers do and a patch a released.</p>
<h2><span style="color: #31aaa2;">Threats to Mobile Device Security</span></h2>
<p>An outdated view of hacking, malware or viruses would limit this activity to desktop computers or laptops. The reality is that mobiles are just as <strong>at risk</strong>. In fact, reported incidents are in the range of 16 million attacks. A mobile device can be at risk from several different methods, some of which include:</p>
<h3><span style="color: #31aaa2;"><strong>Malicious, or Insecure Apps</strong> </span></h3>
<p>Malicious or insecure apps contain cyber security flaws in data storage, communication, or authentication practices, meaning they contain at least one common security vulnerability that can be exploited.</p>
<h3><span style="color: #31aaa2;"><strong>Data Sniffing</strong></span></h3>
<p>Data sniffing by capturing, monitoring and scanning traffic moving across a network. Active sniffingwill monitor traffic and it can also alter it in some way to the like of the attacking party.</p>
<h3><span style="color: #31aaa2;"><strong>Fake WiFi Networks</strong> </span></h3>
<p>Fake WiFi networks poses as a legitimate wireless service provider to intercept information that users transmit.</p>
<h3><span style="color: #31aaa2;"><strong>Vulnerabilities</strong></span></h3>
<p>Vulnerabilities within operating systems can be used to gain control of mobile devices, and depending on the operating system and its software, some mobile devices can be easily patched. However, others may be more difficult to patch, which could leave them vulnerable.</p>
<h3><span style="color: #31aaa2;"><strong>Inactive Apps</strong></span></h3>
<p>Inactive apps that are installed on mobile devices but unused and have unsecured access to personal and corporate information pose a significant danger to devices if they are not uninstalled properly.</p>
<p>In addition to the above threats, mobile devices are also susceptible to physical attacks due to their portability.</p>
<p>But all is not lost. Here are some practical steps that will help you minimize the exposure of your mobile device to digital and physical threats.</p>
<h2>Mobile Device Security Tips</h2>
<p>&nbsp;</p>
<figure id="attachment_6250" aria-describedby="caption-attachment-6250" style="width: 1585px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-6250 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg" alt="Mobile Device Security tips" width="1585" height="1585" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg 1585w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-768x768.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-1024x1024.jpg 1024w" sizes="(max-width: 1585px) 100vw, 1585px" /><figcaption id="caption-attachment-6250" class="wp-caption-text">Mobile Device Security tips</figcaption></figure>
<h3><span style="color: #31aaa2;"><b>Use strong passwords and/or Bio-metrics</b></span></h3>
<p>Passwords are always important, but even more so when you consider that the device could be stolen and in the possession of someone who has unlimited access and time to try various values.</p>
<h3><span style="color: #31aaa2;"><strong>Screen Lock</strong></span></h3>
<p>The display should be configured to time out after a short period of inactivity and the screen locked with a password.</p>
<h3><span style="color: #31aaa2;"><strong>Remote Wipe/Sanitation</strong></span></h3>
<p>Many programs, such as <strong>Find my iPhone</strong> or <strong>Google Play Protect</strong>, even Microsoft Exchange Server (if an exchange email is configured on mobile device) allow you to send a command to the mobile device that will remotely clear the data on that device.</p>
<h3><span style="color: #31aaa2;"><strong>Physical Security</strong></span></h3>
<p>Mobile devices, such as tablets, mobile phones, and smartphones, must be properly stored and secured in a cabinet or safe when not in use.</p>
<h3><span style="color: #31aaa2;"><strong>Utilize VPN</strong></span></h3>
<p>Enforce the use of virtual private network (VPN) connections with a strong protocol like IPSec between the mobile device and enterprise servers, especially if connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Encrypt your device</strong></span></h3>
<p>Data should be encrypted on the device so that if it does fall into the wrong hands, it cannot be accessed in a usable form without the correct passwords.</p>
<h3><span style="color: #31aaa2;"><strong>Disable Unused Features</strong></span></h3>
<p>Every feature has the potential to be another point of vulnerability in a mobile system, so it&#8217;s good practice to disable any features that don&#8217;t serve a purpose in your organization.</p>
<h3><span style="color: #31aaa2;"><strong>Install an Antivirus Application</strong></span></h3>
<p>A mobile antivirus solution will protect devices against malicious code (such as xCodeGhost and iBackDoor) embedded in apps. Here is a quick list of the most popular mobile antivirus application:</p>
<ul>
<li>Kaspersky lab (<a href="https://itunes.apple.com/sa/app/kaspersky-safe-browser/id723879672?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.kms.free" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>McAfee (<a href="https://itunes.apple.com/gb/app/mobile-security-wifi-scan/id724596345?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.wsandroid.suite" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>ESET (<a href="https://play.google.com/store/apps/details?id=com.eset.ems2.gp" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>AVAST (<a href="https://itunes.apple.com/us/app/avast-security-photo-vault/id1276551855?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
</ul>
<h3><span style="color: #31aaa2;"><strong> Disable Wi-Fi and Bluetooth When Not Needed</strong></span></h3>
<p>Disable Wi-Fi and the discovery setting on Bluetooth connections to prevent bluejacking and bluesnarfing attacks and avoid connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Software Updates</strong></span></h3>
<p>Keep the mobile operating system and its apps up to date. Everything from the mobile operating system to the games and miscellaneous apps are potential gateways for hackers to compromise the mobile device. Updating mobile devices and apps on a regular basis ensures the best protection against most mobile security threats.</p>
<h2>Other mobile device security tips</h2>
<h3><span style="color: #31aaa2;"><strong>Perform Regular Mobile Device Security Audits</strong></span></h3>
<p>At least once a year, conducting mobile security audit helps companies keep their compliance programs up to date, effective and aimed in the right direction.</p>
<h3><span style="color: #31aaa2;"><strong>Perform User Education</strong></span></h3>
<p>Implement a continuous information security awareness and training program that teaches employees about mobile device threats and enterprise mobile device management and security policies.</p>
<h2><span style="color: #333333;"><strong>The Bottom Line in mobile device security<br />
</strong></span></h2>
<p>Mobile device security should be a primary concern. It isn’t simple to accomplish, and new attacks occur every day through new vulnerabilities. You need to always be aware of and notice anything unusual that happens on your device.</p>
<p>We hope that the tips mentioned in these article will help to enhance your mobile device security. If you like this article please subscribe to our newsletter and share with your friends.</p>
<p>Also check out how can you raise awareness among employees enhanced mobile devices usage and various other information security domain <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
