Tips to Ensure Mobile Security

[vc_row][vc_column][vc_column_text]


Consider for a moment how much information, both personal and professional you store on your phone. Some information is highly sensitive and some is not (however it would be emotionally unsettling if lost). As our smartphones continue to do and store more for us, security should make its way to the top of the priority list. Don’t wait until it’s too late. Below are some quick, easy and low-cost mobile security measures you can implement immediately.
Simply put, don’t forget to protect your hardware with cases and screen protectors. This will guard against total loss due to damage. Also, back up/synch data regularly to avoid losing all of your information. What about loss or theft? Common sense tells us to never leave our devices unattended, but we are all guilty of taking our eyes off of it from time to time. Instead consider installing a wireless proximity alarm. This will inform you when your phone gets more than a pre-set distance from a proximity device (i.e. key ring); better yet if you lose your keys, you can utilize the smartphone to find them. Other capabilities include locking the phone screen remotely, triggering an alarm or locating the phone via GPS. Proximity alarms currently on the market include:
  • Kensington’s Proximo Tag and Fob (approx. $65 – compatible with Samsung Galaxy and iOS devices)
  • iFi Systems’ Smart Tag (approx. $30 for iPhone and $35 for Android)
  • HipKey Proximity and Movement Alarm (approx. $60 for iOS)
Another way to foil unauthorized users from accessing your device is to incorporate a screen lock. These typically come as standard free features on smartphones, however they must be enabled. Furthermore, the way in which we authenticate continues to evolve – we have seen everything from pin codes, non-simple passcodes, pattern unlock, facial recognition and fingerprint technology. Taking it one step further, you can set your phone to completely wipe data after too many failed attempts. Be careful with this option however, because once data is wiped it will be impossible to enact the security measures mentioned above. There are third-party applications as well that offer some unique security capabilities:
  • Prey Project – allows you to take pictures with your smartphone remotely, track the device, display a message on the screen and push an alert sound.
  • FinderCodes Electronics – offers a lost and found kit that utilizes QR code to link the person that recovered the device with the rightful owner.
  • Cerberus Anti-Theft – enables you to remotely record any audio coming from the phone or wipe the phone of its contents.
  • AndroidLost – allows for remote text-to-speech communication with current user of phone.
Again, don’t wait for something to happen to your smartphone or device before taking more precaution in the future. Consider the outcome of losing sensitive personal or business information and know that you have the power to protect it.

 

For more information on mobile security fill out the contact form to the right or call us at 800-550-3795.

[/vc_column_text][vc_raw_js]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[/vc_raw_js][/vc_column][/vc_row]

Continued Reading

Compliance

4 Cool Microsoft Technologies of the Future

[vc_row][vc_column][vc_column_text] Microsoft researchers unveiled several futuristic technologies during last week’s […]

LEARN MORE

8 DOs and DON’Ts for Keeping your Windows XP Machines Secure

[vc_row][vc_column][vc_column_text] The highly anticipated XP shut down has come…and gone. […]

LEARN MORE

Contact us Today!

Chat with an expert about your business’s technology needs.