Categories: Articles

Protecting Your Phone and Tablet from Loss, Theft and Attacks

used with permission from Norton by Symantec

Our phones are not just phones anymore. That ‘phone’ that you use to stay in touch with people is actually a little computer (let’s call it a ‘mobile device’) containing valuable information about you, your family, your friends, and your life. Can you imagine losing your mobile device?  Or, what if your mobile device or tablet is attacked by a virus or a phone phishing attack? Because many daily activities were previously done on your PC, the information on your mobile device is now as critical and confidential as data on your laptop or desktop. It’s time to start thinking about protection beyond the PC.

People are using their mobile devices for so much more than just talking to each other. Maybe you’re one of them.  Maybe you use your mobile device to pay your bills, check your email, get driving directions, check on retail discounts, download coupons, purchase movie tickets, check on the weather, book an airline flight, and who knows what else?  With the applications (“apps”) that are available for your mobile device, there are endless possibilities when it comes to making your life easier.

To many, mobile devices (particularly the ones with an Internet connection, or what we call “smart phones”) are a lifeline to work, family, and social lives. Moms and dads use them to stay in touch with their kids; executives use them for everything from booking appointments to tracking stock prices; and business owners use them to help track inventory and stay in touch with their workers, their business partners, and their customers.  It’s never ending.

You might have banking and insurance data, private contacts, and a lot of personal and business information that you use on a daily basis residing right there on your ‘phone’. But what if you lost this mobile device? What if it was stolen? Or, what if your mobile device “got sick” with a virus that threatened to destroy or steal that information?  Let’s take a closer look at some of the precautions and mobile security factoids that you should be aware of as you increase your dependency on that ‘little computer’ in your purse or pocket.

Losing your mobile device

Like anything else, it’s certainly possible that your phone could get lost or stolen. Here are some safety tips to keep in mind:

  • Lock it – Always lock your phone when not using it and don’t give anyone the password. If your kids have phones, teach them how to use the lock feature on their phone too.
  • Hide it – If you can’t take your phone with you, don’t leave it in your vehicle where anyone can see it. This could be an open invitation for stealing. Lock it in your trunk or glove compartment. Better yet, take it with you!
  • Don’t advertise your home address – Today’s smart phones often include GPS technology, and if you use this feature it’s quite possible that you have your home address as a “favorite” or frequent destination. It would be wiser to include your home address under a made-up name, so that if your phone is stolen, the culprit wouldn’t have immediate knowledge of where you live.
  • Notify ASAP – If you phone is lost or stolen, contact your phone provider right away in order to prevent anyone else from using your phone.  Depending on your provider, you might be held responsible for unauthorized usage if you do not notify the provider within a certain timeframe.
  • Old phone awareness – If you decide to get a new phone, don’t forget to delete your personal information from your old phone first.  Most mobile devices have a ‘reset to factory settings’ option, and you should use that before recycling or storing it away.  Also, be sure to remove or wipe clean any inserted memory card as well.
  • Secure it – The best thing you can do for the physical safety of your mobile device is to use software that provides an array of features that are specifically designed to thwart unauthorized use of your phone. Norton Mobile Security, for example, not only prevents strangers from using your phone, but will help you or the authorities locate it. In addition, the software lets you lock your phone via the Internet and also will display a message – written by you – that informs anyone who finds the device how to contact you or make arrangements to get it back in your hands.  If it gets to the point that you know your device has been stolen and is unrecoverable, Norton Mobile Security lets you remotely erase data on your phone so that it can’t be used by anyone else.

Phones are not immune to ‘phishing’ attacks

As stated earlier, your mobile device is literally a computer. And just like your desktop or laptop at home and at work, smart phones are susceptible to threats, viruses, and attacks.

You should already know that when using the Internet on your mobile device, don’t click on any unknown links.  In fact, you should adhere to the same website vigilance that you would practice on any other computer. In other words, be careful!

Yes, even on your phone, you can easily click on a fraudulent link that can take you to a website designed to fool you into revealing personal information that can be used to steal your money, your identity, or both.  As recently as last month, there was a phony program, disguised as a Netflix app, distributed to unsuspected victims. The “app” was actually designed to steal account information and, ultimately, people’s identities. A program like Norton Mobile Security protects you from these types of culprits.

Without slowing your mobile device down or adding anything complicated to the mix of programs you may already have on your device, Norton Mobile Security also provides anti-phishing protection, download threat protection, and will even remove mobile threats before they do any harm.

Protect your Tablet too!

Tablet computers have gained in popularity, and just like any other “smart” device, you’ll need to protect your tablet and the data on it from loss, theft, viruses, and other threats. Antivirus and antimalware protection is available on Norton Mobile Security, which scans all files that enter the device. Plus, an on-demand scan lets you check out the safety of applications and files that are already on the tablet.

Just like your mobile device, your tablet requires the same web protection, threat protection, and anti-phishing protection, and Norton Mobile Security delivers it in spades. With features designed to thwart thieves and troublemakers, your tablet’s processing time or web browsing won’t be slowed down at all, despite the added protection.

Summary

We carry our mobile devices and tablets virtually everywhere we go. If you lose these machines, it can cost you time, money, inconvenience, embarrassment, and worse. Be sure to keep these devices protected as you would any other computer.  In fact, all your family devices, used by kids and spouses, should maintain the same level of protection. Be sure to teach your kids that smart and sensible Internet habits are not only applicable to desktops and laptops, but also to their phone and tablet devices as well.

To learn more, contact us today.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Shared Mailbox vs. Regular Mailbox in Microsoft Exchange

Microsoft Exchange provides multiple ways to control email communication in a business. Shared Mailboxes and…

2 days ago

Remote Work Rising: The New<br>Way We’ll Work

Remote working was once a niche specialty, only used by tech-savvy and freelancers. But in…

2 days ago

The Role of Print Servers In<br>An Organization

While we live in a digital age, print is still a staple for many businesses.…

2 days ago

Implementing Anti-Spoofing Rules for Email Protection

Increasingly, email communication is playing a pivotal role in business operations, facilitating collaboration, customer engagement,…

3 days ago

The Comprehensive Benefits of MSP Management for Servers, Exchange, O365, VPN, and Networks

As the digital landscape evolves, businesses of all sizes face the challenge of managing complex…

3 days ago

Cost-Benefit Analysis of On-Premises Network/Server Infrastructure vs. Azure-Based Cloud Infrastructure

In the evolving landscape of information technology, businesses constantly seek the most efficient and cost-effective…

3 days ago