Protecting your Smart Phones

| No Comments | No TrackBacks
Many consumers have had difficulty understanding how to best protect their smart phones from being hacked. Smart Phones were introduced as being able to simplify your daily life, and the demand on the manufacturers was significant enough to ramp up production on the devices, but not on the security used in the devices. Here's some info offered by security expert, Albert E. Whale, Sr. Security, Network, and Risk Assessment and Systems Consultant of ABS Computer Technology;

Smart Phone Security

By Guest Blogger: Albert Whale

Where are you?  Right now, I want you to stop and think about where you are, what it's taken to get where you are, and how many people were involved in getting to your present destination or status in life.  You might think that this is an unusual request, but if you have a Smart Phone which you use to organize your daily life, your current position or personal security, is in serious jeopardy.

Smart Phones were introduced as being able to simplify your daily life, and the demand on the manufacturers was significant enough to ramp up production on the devices, but not on the security used in the devices.

As I write this article, I am protected with multiple layers of security which protect both the network which my laptop is connected to as well as the added bidirectional firewalls, Web Content scrubbers , Email Security , Spyware removal tools, and anti-virus tools.  None of these were needed when the Internet was first operational, but they have become a necessity for businesses to operate safely, due to the hazards of connecting the entire world on a single network.

So you have similar protection, on your PC, or you may rely on your anti-virus software to indicate that you've had a security event . Now look at your Smart Phone.  What do you have to protect it's contents?  Most people with a Smart Phone have synced their contact lists with their PC, and perhaps even the corporate network as well.  So you have all of the bells and whistles, remote email, GPS navigation, mobile office software and made it portable for your convenience as well.  But what have you done to protect your assets, and identity?

Anyone's personal security is only as good as the weakest link.  Think about it.  A chain is only as strong as the weakest link.  This is also the same for your security; this is why we stress on using a layered defense approach for security.

So why is your security so important?  Well, you may have heard about the issues in WiFi networks which permit Hackers to penetrate WiFi networks as much as 10 miles away.

Similar technology exists for extending the Blue Tooth signal for over a mile away.  Can you spot your attacker if they are a mile away?  Probably not, especially not without the latest binoculars that the Military uses.

 OK so now what can you do?

Here are a few suggestions on what you can do today!
 

1.  Disable the broadcast mode on your device which will put it into a non-discoverable state (most devices have this option).  This will make your Bluetooth device more secure by making it invisible to other Bluetooth devices.

2.  Do not accept files transmitted via Bluetooth wireless technology or any other technology from unknown or suspicious entities. (I'll bet that you knew that already though, didn't you?)

3.  Do not pair with unknown devices. That will give the unknown device access to all your services .

4.  Check for security patches from your phone's manufacturer and use these fixes to minimize your phone's vulnerability.

For more info on computer and smart phone security see; ABS Computer Technology, Inc: and earlier blogs by Albert;


Is your PC slow of finicky? 

Protect your Wireless Access Points

;


No TrackBacks

TrackBack URL: http://www.givemebackmycredit.com/cgi-bin/mt/mt-tb.cgi/294

Leave a comment


A memoir exposing the steep price consumers pay when facing mortgage servicing errors, inaccurate credit reporting, illegal debt collection practices, identity theft and weak consumer protection laws. THE BOOK » DENISE'S STORY »