Is your smartphone secure? Tips to keep your information safe

Dec 12, 2012
The proliferation of smartphones--70 million are lost each year--heightens the importance of users following a few basic security steps to protect data.

With 6 billion mobile phone subscriptions worldwide—that's about 87 percent of the world population—and an even higher percentage of users estimated on campuses, Indiana University has embarked on a mobile security campaign to heighten awareness about the tools available to safeguard users and their products.

"Because mobile devices are so popular, compact and convenient, they are at high risk of loss or theft," said Eric Cosens, IU deputy information policy officer. "In fact, industry sources say that one laptop is stolen every 53 seconds, and 70 million smartphones are lost every year. We want users of mobile devices to know that it's easy to protect your personal data from criminal activity if your device is lost or stolen."

Research has shown that about half of all store passwords, personal information and on their devices. However, by following a few easy steps provided through resources at IU, faculty, students, staff and others can substantially lower risks and increase safeguards on mobile devices, he added.

"We recognize the proliferation of on campus and in our communities," IU information security officer Andrew Korty said. "But by following a few basic security tips, like setting a or passcode, or configuring your device to conduct an automatic data wipe after a specific number of failed passcode entries, you can significantly increase your protection."

The top risk to smartphones is outright physical theft of the device since criminals have a much tougher time gaining administrative access to devices not in their physical control. But even if unapproved administrative access is a worry, additional protections can be taken.

Users can enable data encryption to prevent criminals from reading data by extracting the memory; Bluetooth can and should be disabled when the device is not in use so as to reduce risk of intrusive hacking attacks; and GPS can be disabled when not in use so the device, unbeknownst to the user, is not transmitting location data (although some GPS-enabled apps and services can help find lost or stolen phones).

Visit IU Mobile and its Mobile Device Security page for tips and advice on protecting devices. Instructions on how to conduct remote data wipes and auto-wiping, how to configure devices, what to do if a device is stolen and how to choose a secure PIN can be found by visiting Indiana University Information Technology Service's Knowledge Base mobile device data protection page.

Explore further: Godzilla stomps back in ultra HD, wires intact

add to favorites email to friend print save as pdf

Related Stories

NIST updates guidelines for mobile device security

Jul 11, 2012

The National Institute of Standards and Technology (NIST) has released a proposed update to its guidelines for securing mobile devices—such as smart phones and tablets—that are used by the federal government. NIST ...

US stolen phone database in operation

Nov 01, 2012

US mobile carriers began implementing a system this week to block the use of stolen mobile phones, part of an effort to curb rising thefts of smartphones such as the iPhone.

Mobile-security services take off

Sep 26, 2011

The prospect of consumers and employees physically losing information-packed mobile devices, or getting them hacked, has become the driver for a red-hot sector of the tech industry: supplying mobile security.

Recommended for you

Godzilla stomps back in ultra HD, wires intact

19 hours ago

At a humble Tokyo laboratory, Godzilla, including the 1954 black-and-white original, is stomping back with a digital makeover that delivers four times the image quality of high definition.

Overly polite drivers, not roadworks, cause traffic jams

Aug 25, 2014

British motorists who are too polite or timid in their driving style are the cause of lengthy traffic jams across the UK, particularly when faced with roadworks or lane closures, according to a leading Heriot-Watt ...

Voice, image give clues in hunt for Foley's killer

Aug 21, 2014

Police and intelligence services are using image analysis and voice-recognition software, studying social media postings and seeking human tips as they scramble to identify the militant recorded on a video ...

Smartphone-loss anxiety disorder

Aug 21, 2014

The smart phone has changed our behavior, sometimes for the better as we are now able to connect and engage with many more people than ever before, sometimes for the worse in that we may have become over-reliant on the connectivity ...

User comments : 0