MCC Daily Tribune Archive

Securing Your Mobile Device

Mobile devices are computers with software that needs to be kept up-to-date (just like your PC, laptop or tablet).  Security protections are built-in and updated on a regular basis.  Take the time to make sure all the mobile devices in your home have the latest OS and apps.  This may require syncing your device with a computer. Having the latest mobile app software, web browser, and operating system is the best defense against viruses, malware and other online threats.

It’s amazing how many IP devices we have today in our home.  This past weekend I counted fifteen, yes, fifteen (15) IP devices in my home.  From laptop, iPads, iPhones, Smart TV devices, WiFi router, gaming devices and then your family and friends come over with their mobile devices.  All of these IP devices need protection from viruses and malware and regular updates performed.

Phones, iPads and tablets can contain tremendous amounts of personal information.  Lost or stolen devices can be used to gather information about you and others.  Protect your mobile device like you would your wallet. Use a strong passcode to lock your phone or tablet.  Never leave your device in a public place unattended. Think before you download that free app. Review the privacy policy and understand what data the app can access on your device before you download.  Prior to installing a new app, check the ratings and comments to be aware of what the app does and what information it may access on your mobile device. Be aware that malware and fraudulent applications do exist. Only download mobile applications from authorized application stores like the Apple App Store or the Android Market.

Location Services, Privacy Settings and GeoTagging: Location Services allows Apple and third party apps and websites to gather and use information based on the current location of your mobile device.  GeoTagging is the process of adding geographical identification metadata to various media such as pictures, videos, websites, QR Codes, etc.  It usually consists of latitude and longitude coordinates.  These services can be turned off.  You should know what apps you are allowing these services to access your location.

This cyber-security tip is brought to you by the ETS: Cyber Security Awareness Program.

Donna Pogroszewski
Communications and Network Services