Smart Ideas for Smartphone Security



Similar documents
Mobile Operating Systems & Security

Mobile Iron User Guide

Students Mobile Messaging Registration & Configuration

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Spring Hill State Bank Mobile Banking FAQs

Backing Up Your Files. External Hard Drives

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

How to wipe personal data and from a lost or stolen mobile device

Solutions for Sending LARGE Files Over the Web by Kara Mueller Primary Help Desk Tech

Apple Configurator MDM Site - Review

Pryvate App User Manual

Mobile Devices Using Without Losing

Information Systems. Connecting Smartphones to NTU s System

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Mobile Health Apps 101: A Primer for Consumers. myphr.com

10 Quick Tips to Mobile Security

Managing Mobility. 10 top tips for Enterprise Mobility Management

NetSafe Smartphone Security Report 2014

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data

Quick Start Guide. Version R9. English

Sophos Mobile Control User guide for Apple ios. Product version: 4

Android support for Microsoft Exchange in pure Google devices

NHSmail mobile configuration guide Apple iphone

In the Cloud. Scoville Memorial Library February, 2013

ios How to Back Up from icloud

Reboot, reset, erase, power off, restore - what's the difference?

Getting Started with the Naviance Student Mobile App

1:1 ipad Program Device Setup Guide

ONE Mail Direct for Mobile Devices

Android Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies

ipad Set Up Guide: Staff! 1 of! 20

Table of Contents iphone Setup ipad Setup Android Phone Setup Windows Phone Setup

How to Remotely Track Any Lost Smartphone, Tablet, or PC

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

SysAid MDM User Guide for ios

Securing your credit *

Sophos Mobile Control User guide for Apple ios

FAQ for ipad (ios 5.x)

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

HELPFUL TIPS: MOBILE DEVICE SECURITY

Configure SLC to Smartphone/ Tablet

Faculty & Staff: Office 365 Migration

Apple Deployment Programs Apple ID for Students: Parent Guide

Microsoft Exchange Information Services and Security Policies Supported by Android 2.2

MOBILE BANKING. Why should I use Mobile Banking?

Mobile Deposit Frequently Asked Questions

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Mobile Communicator for Mobile Devices

Online Services User Guide

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Systems Manager Cloud Based Mobile Device Management

Mobile App Frequently Asked Questions

Mobile Device Management (MDM) Policies

Avira Antivirus Security. HowTo

Apple ios 8 Security

User Manual for Version Mobile Device Management (MDM) User Manual

AirWatch for Android Devices

ADDING STRONGER AUTHENTICATION for VPN Access Control

Administrator's Guide

Soonr Workplace Enterprise Plan Overview

Exchange ActiveSync (EAS)

Mobile Device Management (MDM) Policies. Best Practices Guide.

Mobile Device Management Solution Hexnode MDM

CommBank Small Business app User Guide

Why you need. McAfee. Multi Acess PARTNER SERVICES

Creating an Apple ID on an iphone, ipad, or ipod touch with a Credit / Debit Card

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

Northeast Bank Mobile Deposit Service FAQ

Cisco Mobile Collaboration Management Service

Bring Your Own Device Policy

BlackBerry Link for Windows. Version: User Guide

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Sophos Mobile Control user help. Product version: 6.1

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Feature List for Kaspersky Security for Mobile

What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app?

Bell Mobile Device Management (MDM)

Mobile Device Management ios Policies

How can I protect against the loss of my ID if my device is lost or stolen?

Backing up your digital image collection provides it with essential protection.

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

Kaseya 2. User Guide. Version 7.0. English

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Deploying iphone and ipad Mobile Device Management

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

ios Education Deployment Overview

Transcription:

Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone Security by Kara Mueller Primary Help Desk Tech If a stranger were to grab your cell phone right this moment and walk away, what could they do with it? How much damage could be done? Would they be able to access your e-mail, personal files, pictures or maybe even sensitive information related to your job? And when you finally realize your phone is missing...what could you do about it?

Page 2 of 6 Lookout Mobile Security (for ios and Android) - In addition to allowing you to remotely locate your phone, Lookout backups up contacts, scans every app to ensure its safe before downloading, protects from visiting fraudulent links, and can alert you when your smartphone software is outdated and a security risk. Seal (Android) - Password protect certain apps only with this app. Fans of this app enjoy installing it on tablet computers used by many individuals, such as for families. Big Brother camera (ios) - This app takes a photo of every person who accesses the lock screen of the phone and sends an e -mail to a specified address with the photo, date, time, GPS coordinates, and whether the attempt was successful or not. Articles of Interest 10 Mistakes to Avoid When Buying & Using Smartphones User Picks: 7 Hot ipad apps for business 7 apps to obsess over the summer The Five Stages of Losing a Smartphone Sadly, theft of mobile devices such as smartphones is on the rise. None of us want to imagine our phone ever being stolen, but misplacing losing your phone in the couch cushions is something I'm sure has happened to most of us at least a few times. While I hope your smartphone is never lost or stolen, taking steps to secure your data now (in case it ever does happen) is crucial! Here are a few ways to safeguard your smartphone and possibly save some headaches in the future. Lock It Up! The number one tip I recommend for safeguarding your smartphone is to activate the lock screen. Once activated, the correct password, pin code, or swipe pattern is required to unlock it. Be sure to set your lock period (the amount of time that passes before the phone requires you to enter the code again) to the shortest possible - immediate is best! For added security: Most devices can be set to only allow a certain amount of incorrect entries of the passcode before the device is reset. This prevents someone from guessing the passcode by trying many combinations. Of course, use caution around young children, who have been known to accidentally wipe devices enabled with this feature while playing with it!

Page 3 of 6 Setting up the lock screen on iphone Setting up the lock screen on Android Settings up the lock screen on Windows phone Stay Connected Choose a secure passcode When you're choosing a passcode, it may be tempting to pick something easy to enter, such as 1111, 2222, and similar patterns. Thieves are hoping you'll do just that! Avoid these top 10 most common passcodes: 1234, 0000, 2580, 1111, 5555, 5683, 0852, 2222, 1212, and 1998. Access your device remotely What could you do if your phone were lost or stolen? There's an app for that! Use apps to remotely wipe or lock your phone, display a message, show GPS coordinates of your device or play a loud noise to help find it. All iphone users should be using "find my iphone." This wonderful (and free) feature from Apple could be very important in helping to locate a missing iphone (also available for other Apple products, like the ipad and Macbook). It takes a little setup, but can be invaluable - even if you just need to locate your iphone in your home. Here are instructions to set up Find My iphone. Android users have many downloadable app options through Google Play. A few include Find My Phone, Cerberus and Android Lost.

Page 4 of 6 Updates! Keeping your smartphone up to date is another important part of ensuring the safety of your device. When security flaws are found within smartphone software, updates are often dispatched to fix these problems. Updates are normally accompanied by a popup message on your screen, but you can always check for new ones under the settings of your device. Backup your data Prevent data loss by backing up the information on your smartphone regularly. The iphone is set by default to create a backup of the phone when it is connected to a computer and synced with itunes. You can also setup icloud backups if your iphone isn't connected to itunes often (here's how) Android phones are set to backup some information to your Google account automatically - certain system settings, contacts, e-mail, calendar, and apps. In order to back up other items, such as photos or SMS messages, it's most convenient to use an app that will do the job for you. G Cloud Backup and My Backup Pro are both great options for easy and secure backups.

Page 5 of 6 Finally... While implementing new security measures on your smartphone (like a passcode lock) are inconvenient, you'll be glad you did if you ever misplace your device. If your smartphone is ever lost or stolen, The International Association for the Wireless Telecommunications Industry at CTIA.org recommends: Report it - to your wireless provider and to the local police. 1. 2. Locate it - Using a remote app, locate and lock the device to the thief cannot access your information. DO NOT attempt to recover it on your own! Erase it - If you don't believe it will be returned. This resets your phone to its default and removes all personal information. Seltek 804-360-4490 x13 wendy@seltekinc.com http://www.seltekinc.com 8814 Fargo Road Suite 105 Richmond, VA 23229 Copyright 2012. All Rights Reserved. Forward this email This email was sent to wendy@seltekinc.com by wendy@seltekinc.com Update Profile/Email Address Instant removal with SafeUnsubscribe Privacy Policy.

Page 6 of 6 Seltek 8814 Fargo Road Suite 105 Richmond VA 23229