<<

MOBILE DEVICE SECURITY

Mobile Device Security is the protection of sensitive information transmitted by your , tablets, , and other mobile devices.

Mobile device security aims to:  Protect sensitive data stored on portable devices  Prevent unauthorized users from using mobile devices to access the enterprise network.

Here are some helpful tips to keep your devices and personal information safe.

NETWORK THREATS DEVICE/APP THREATS WHY DOES IT MATTER? Unsecure Wi‐fi Data Privacy No one wants to burn through their cellular data Install the patches and security updates as soon as when hot spots are available—but free Wi‐ you receive them. These updates not only improve Fi networks are usually unsecured. your device’s performance, they improve security 60.5% of government and can prevent known threats/vulnerabilities. agencies reported they had  Only use free Wi‐fi sparingly and never use it to access confidential or personal services, experienced a security incident  Don’t ignore necessary software updates (i.e. banking, credit card). designed to improve your device’s security by involving a mobile device. fixing bugs and potential vulnerabilities. – Lookout, Inc. Fake Networks, AKA: Cybercriminals can access your phone through the unused apps. Think about how often you use Network Spoofing a and the Cybercriminals give Wi‐Fi access points common  Remove outdated and unused apps to reduce information that shared apps, names to encourage users to connect. In some your device’s susceptibility. emails and notes. Our devices cases, attackers require users to create an “account” to login. Once logged in, the hacker Hackers and cybercriminals can use your location hold plenty of personal and services (e.g., Cloud services) to hack your phone. workplace data valuable to may compromise the user’s email, e‐commerce, and other secure information. cybercriminals.  Use cloud services, such as Android Device  Beware of fake access points (Wi‐Fi) that Manager and Find My iPhone to your look like networks but are traps in high‐ advantage. Remotely track (and wipe) a continues lost/stolen device. to become more complex – traffic public locations (i.e. coffee shops, libraries and airports). Confirm the Wi‐Fi you leading to wider opportunities are connecting to is legitimate prior to for unauthorized access to, accessing. Phishing Attacks change of, or destruction of Mobile devices are always powered‐on and often government/personal  Use caution when connecting to any free Wi‐Fi the first to receive legitimate‐seeming emails. Don’t and never provide personal information. If take the bait! functions. asked to login always create a unique ‐ HuffPost password, just in case.  Never click on unfamiliar links and hover over to verify the link source. When in doubt, enter As government and personal Vulnerability URLs manually to be as safe as possible. services become A group of researchers exposed a severe increasingly dependent on vulnerability called Key Negotiation Of Data Leakage mobile technology, new threats Bluetooth (KNOB). The vulnerability allows the Mobile apps are often the cause of unintentional emerge, and new approaches attacker to intercept, monitor, or manipulate data leakage. Free apps may perform as advertised, are needed to secure the encrypted Bluetooth traffic between two paired but also send data to a remote , where it devices, without being detected. is mined by advertisers and even cybercriminals. unique capabilities and ‐ Security Boulevard functions of mobile devices.  To avoid data leakage, only give apps the ‐ DHS  Prevent tracking by disabling and enabling permissions they absolutely insist on, and Bluetooth service when needed. This action forgo any program that asks for more than will reset the address as well as the message necessary. content, which prevents further tracking. You may also choose to disable the default (always‐on) option. ‐ Futurity

Additional Resource: DHS – Study of Mobile Device Security https://www.dhs.gov/publication/st‐mobile‐device‐security‐study