DIGITAL LIFE E-GUIDE How to Protect your Smartphone

Similar documents
What You Should Know About Cloud Storage

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

How Do Threat Actors Move Deeper Into Your Network?

10 Quick Tips to Mobile Security

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Home Automation and Cybercrime

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

General Security Best Practices

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

MOBILE BANKING USER GUIDE

Malware & Botnets. Botnets

Internet threats: steps to security for your small business

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

National Cyber Security Month 2015: Daily Security Awareness Tips

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

Security Fort Mac

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Perception and knowledge of IT threats: the consumer s point of view

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Securing Corporate on Personal Mobile Devices

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

How To Protect Your Data From Being Hacked

Latest Business Compromise Malware Found: Olympic Vision

Safety precautions for Internet banking or shopping How to avoid identity theft online

Learn to protect yourself from Identity Theft. First National Bank can help.

Guideline on Safe BYOD Management

How-To Guide: Cyber Security. Content Provided by

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

Remote Access Securing Your Employees Out of the Office

Trust Digital Best Practices

AVG AntiVirus. How does this benefit you?

How To Prevent Cybercrime

Is your business secure in a hosted world?

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Finding Security in the Cloud

The problem with privileged users: What you don t know can hurt you

Beyond passwords: Protect the mobile enterprise with smarter security solutions

ADDING STRONGER AUTHENTICATION for VPN Access Control

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

OVERVIEW. Enterprise Security Solutions

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

When enterprise mobility strategies are discussed, security is usually one of the first topics

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

THE LITTLE BIG BOOK OF BADNESS

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Smartwatch Security Research

In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Best Practices Guide to Electronic Banking

Know the Risks. Protect Yourself. Protect Your Business.

Guidelines for smart phones, tablets and other mobile devices

Cybercrime Prevention and Awareness

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

SPICE EduGuide EG0015 Security of Administrative Accounts

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Intelligent, Scalable Web Security

of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants

Symantec RuleSpace Data Sheet

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

The Hidden Dangers of Public WiFi

Transcription:

A DIGITAL LIFE E-GUIDE How to Protect your Smartphone

It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money though, your smartphone contains data. This makes it an obvious attack target for hackers and cybercriminals. One careless move and your data can easily fall into the wrong hands. That s why it pays to learn how to protect the data in your smartphone. 1 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_a-look-back-at-2011_ information-is-currency.pdf

What s in Your Smartphone?

You may not realize how much data is in your mobile device. Sending email, accessing social media, and banking online have become ordinary mobile device tasks. Cybercriminals want your data because they want to make money off it. Data stored in mobile devices: Contact details Text messages Emails Photos and videos Call logs Calendar history GPS locations App passwords Recorded audio Browsing history Online accounts accessible via mobile devices: Social networking accounts Bank accounts Gaming accounts App store accounts Mobile payment information

How You Stand to Lose Data

You can lose data if you don t pay attention to how you share and who you share your information with. How Much Is Too Much? Some view social networks as extensions of themselves but there is such a thing as oversharing. Personal details like vacation plans shared via social media can inadvertently wind up in the wrong hands. Your physical possessions are put at risk when you let people know you re away from home. Every app that is integrated into social media can get access to your profile. Oversharing also happens when you freely give out all your contact details. Did you know that this is how scammers and spammers can get to you? This is how 419 or Nigerian scam spam, emails that seek donations to fake causes, end up in your inboxes.

Good App, Bad App The number of malicious apps has risen over the past year. Malicious apps can account for data leakage incidents. These steal data by spying on your location history, reading your saved text messages, and sniffing out your personal details like user names and passwords. But did you know that legitimate apps can also expose your data? Some legitimate apps seek too many permissions and have access to too many of your social networking accounts. 2 2 http://www.trendmicro.com/cloud-content/us/pdfs/business/ ebooks/when-android-apps-want-more-than-they-need.pdf Wi-(Fi) Not? When you access open wireless networks through your mobile device, anyone on the same network can see your online activities. Sniffer apps monitor and record unprotected data sent across a network. These can even allow others to access your Facebook, Twitter, and YouTube accounts if you re on the same Wi-Fi network. 3 This means they can hack into your accounts and steal, change, or delete your personal data. 3 http://www.engadget.com/2011/06/02/faceniff-makes-facebook-hacking-a-portable-one-tap-affair-vide/

A Golden Key Can Open Any Door We all know the importance of creating a strong password but we don t always do so. People can easily hack into your accounts if you use weak or easy-to-guess passwords. Using the same password for different accounts like banking and email is even worse. 4 That single password is like a master key for a wealth of information. Password use shouldn t be limited to online accounts. All smartphones have a security lock function but only few choose to use it. Most opt not to use a password or PIN for convenience s sake. 5 This is risky for anyone who loses his/her phone because hackers can immediately gain control of the sensitive information in it. 4 http://gizmodo.com/5861667/the-25-most-popular-passwords-of-2011 5 http://www.confidenttechnologies.com/news_events/survey-shows-smartphone-users-choose-convenience-oversecurity

Is Your Mobile Data Ripe for the Picking? More and more cloud storage service providers are cropping up but not all are created with security and data protection in mind. In fact, some cloud services can put your data at risk. System downtime and illegal activity by the company can render your data inaccessible. 6 Megaupload was charged with knowingly distributing illegal copies of copyrighted works through its sites, along with money laundering through a rewards program. All of the data stored on the sites were taken offline, causing millions of users to lose data. 6 http://arstechnica.com/tech-policy/news/2012/01/megaupload-shut-down-by-feds-sevencharged-four-arrested.ars

Are You Protecting Your Data? Protecting your device should be a priority given the amount of information you store in it. Here s how: Use built-in security features. That way, only you can access the data stored in it. This adds another layer of protection should you lose your smartphone. Create strong passwords. Choose complex passwords. Investing in a password manager is also a good idea. Access only trusted Wi-Fi networks. Do not automatically connect to open Wi-Fi networks. Scrutinize apps. Read reviews and check the developers pages before downloading and installing apps. Verify permissions an app seeks before granting them. Invest in a security app. It would even be better if the security app can remotely lock a stolen device or wipe out the data in it. Periodically back up data. You can do so on your computer or via a trusted cloud service. Backing up data in the cloud allows you to access your data anywhere, anytime. Some apps even let you access all your data across multiple devices, saving you time.

TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits our customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. TRENDLABS SM TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity. 2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.