11 Ways to Protect Your Cellphone and Business

by Katherine Bodendorfer

Cell phone security is a top concern for enterprises—and for a good reason. Everywhere you look, people use their mobile devices. These devices are a permanent fixture of our lives and nearly all workers (86 percent) use mobile access to email, internet, GPS navigation, text messages and so on. But these mini computers are a growing target for hackers.

The reason for insecurity is because mobile devices are not accustomed to the same technical security as computers, like antivirus, firewalls, and encryption. In addition, users are much less aware of mobile security solutions. In fact, Cisco ranks mobile devices as the #1 hardest enterprise asset to defend.

We know security is only as good as the weakest link. As such, mobile cybersecurity relies both on technology development and on the awareness and daily practices of users.  Everyone has a part in keeping up with the strongest and most resilient cybersecurity posture possible.

Consider these 11 simple solutions from Michael Nash, cell phone vulnerability expert, to help provide an additional layer of protection to your mobile device:

1) Keep your Wi-Fi turned off when not connected to trusted networks.

2) Keep your Bluetooth turned off. Enable only when needed.

3) Download only from reliable sources, like your Apple store. In March 2017, London-based hackers under the name Turkish Crime family were trying to extort Apple. They claimed to have access to millions of apple email accounts with the @cloud, @mac, and @me domains. The group threatened to wipe out accounts unless Apple paid the $75,000 ransomware in cryptocurrency. This story is important because it highlights how data can be aggerated from various sources. Always use official app stores to download and install an app.

4) Never grant permissions to any third-party app.

5) Download a mobile security app that scans for malware and spyware. German-based Avira is an effective antivirus engine on the desktop, and it’s mobile security also has some useful features such as helping to block phishing attempts and automatically scan email address. You can also consider investing in Trend Micro for iOS and Android.

6) Install another layer of protection by considering EZShiled Mobile App. This can help keep tabs on one’s identity through the services of fraud and identity theft protection.

7) Install an ad blocker and domain blacklisting. ZENetworks Mobile Management is a software offering secure, scalable management for your mobile devices.

8) Beware of phishing attempts. It’s harder to identify a phishing attempt on your cell than on your computer. Do even not consider clicking on suspicious links that you did not request. Verify on your computer if you must.

9) Enable encryption.

10) Understand common wireless risks. Smartphones are susceptible to malware and hacking when leveraging unsecured public networks. Public WiFi networks are attractive to hackers because authentication is not needed, so avoid accessing personal information around insecure settings.

11) There is a time and a place for everything. That said, some of the most effective solutions can be found in signal isolation technologies for offices and conference rooms. These devices rely on material science to prevent real-time remote surveillance. They work by physically isolating your phone from any and all network connections. When used in a conference room or office setting, these devices remove the threat and the distraction posed by the presence of wireless devices like cell phones.

Recommended Posts
Terry Roberts

Terry Roberts presents live show and podcast by providing insights to Workforce show's Cyber Edition. Click the link in the post and listen to the…

Katherine Bodendorfer

Companies need to consider a risk approach regarding the gaps in security. Risks to your revenue and reputation expand when sensitive information…

Terry Roberts

A great philosopher once said, "A hero is someone who has given his or her life to something bigger than oneself". In light of this, let us…