{"id":8223,"date":"2014-08-12T09:30:02","date_gmt":"2014-08-12T14:30:02","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=8223"},"modified":"2022-11-22T11:20:46","modified_gmt":"2022-11-22T17:20:46","slug":"7-security-tips-for-mobile-users-part-1","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2014\/08\/7-security-tips-for-mobile-users-part-1\/","title":{"rendered":"7 security tips for mobile users (part 1)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" alt=\"Education\" width=\"76\" height=\"100\" class=\"alignleft size-full wp-image-725\" \/><span style=\"font-size: 14px;\"><em>Summary: As smartphone usage grows in the business, many users still don&#8217;t understand proper security practices. If not addressed, this problem could put their (and your company&#8217;s) sensitive data at risk. Learn how your users can better protect themselves from mobile security threats.  <\/em><\/span><br \/>\n<a name=\"20140811\"><\/a><!--more--><br \/>\nThe rise of smartphone and tablets in the business opens up a new world of opportunity. We&#8217;ve seen businesses use them for <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Mobile apps improve business']); \" href=\"https:\/\/www.mrc-productivity.com\/blog\/2013\/04\/4-great-examples-of-mobile-apps-improving-business\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">all sorts of tasks<\/span><\/a>. For instance, we&#8217;ve seen businesses use smartphones to:<\/p>\n<ul style=\"font-size: 14px;\">\n<li>improve productivity, <\/li>\n<li>automate manual processes,<\/li>\n<li>improve data accessibility,<\/li>\n<li>and much more<\/li>\n<\/ul>\n<p>But, besides all these benefits, smartphones create something else: new security risks.<\/p>\n<p>As more employees adopt smartphones, many still aren\u2019t aware of proper security practices. If not addressed, this problem could put your sensitive corporate data at risk.<\/p>\n<p>Today, let\u2019s uncover some mobile security tips that could help you avoid a security breach. Now, this is a broad topic, so I\u2019m breaking it up into two articles. We\u2019ll cover some security tips now, and the rest in an upcoming article. Sounds good? Alright, here are 7 security tips for mobile users:<\/p>\n<h3>1. Be wary of public WiFi (and bluetooth)<\/h3>\n<p>Public WiFI hotspots are convenient&#8230;but insecure. Here\u2019s a good rule of thumb when using public WiFi: Assume someone is watching. <\/p>\n<p>Does that sound a little paranoid? Consider this: A few years back, researchers created a Firefox plugin called \u201cFiresheep.\u201d They built it to highlight the security risks of public WiFi. What does it do? Firesheep lets anyone watch your activity on an unencrypted network (like public WiFi). No hacking skills needed. <\/p>\n<p>That should make you think twice before pulling up sensitive information on a public network.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n<figure id=\"attachment_8233\" aria-describedby=\"caption-attachment-8233\" style=\"width: 240px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/08\/small_291353662.jpg\" alt=\"photo credit: tonyhall via photopin cc\" width=\"240\" height=\"160\" class=\"size-full wp-image-8233\" \/><figcaption id=\"caption-attachment-8233\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/anotherphotograph\/291353662\/\">tonyhall<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/2.0\/\">cc<\/a><\/figcaption><\/figure><span style=\"font-size: 14px; line-height: 1.7em;\">\u201cEvery hotel, bar, restaurant and park will probably offer up free Wi-fi, but with the ease of setting up a hotspot, this has become a cheap and easy way for thieves to access the personal information on your device,\u201d says Gavin Kim, President, International and Chief Commercial Officer of <span style=\"color: red;font-weight: bold\">NQ Mobile<\/span>. \u201cWhile shorter-range and device-to-device, Bluetooth carries with it the same risks. The scammer need only get access, then anything you have stored is ripe for the taking. Especially if doing something like mobile banking, use your device&#8217;s data connection instead of a random open WiFi hotspot. But as a general rule, when in doubt, turn your WiFi and Bluetooth connections off.\u201d<\/span>\n<\/p><\/blockquote>\n<h3>2. Use a VPN<\/h3>\n<p>So, should you avoid all public WiFi? Not necessarily. If you must use public WiFi, protect yourself with a Virtual Private Network (VPN). As explained below, a VPN installed on the device will help protect you from the risks of public hotspots.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cIt\u2019s very important that employees turn on a personal VPN service when they connect to public WiFi,\u201d says Sunday Yokubaitis, President of <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Golden Frog']); \" href=\"http:\/\/www.goldenfrog.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Golden Frog<\/span><\/a>. \u201cPublic WiFi hotspots at places like coffee shops and airports are notoriously dangerous for mobile users. Any business that has employees who work remotely at these types of locations should install a personal VPN service on their employees\u2019 mobile devices. A VPN will encrypt the Internet connection so business tasks like email communication, data and file transfers and Web browsing are kept private and secure. VPNs are a known commodity to techies, but the key for a company to realize the full benefits of a VPN is choosing a service that is straightforward to setup and simple to use to so all employees are comfortable using it.\u201d\n<\/p><\/blockquote>\n<h3>3. Secure your device with a password<\/h3>\n<p>Here&#8217;s a shocking <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'Consumer Reports']); \" href=\"http:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">statistic<\/span><\/a>: 3.1 million American consumers were victims of smartphone theft last year. That number will rise this year.<\/p>\n<p>What\u2019s worse: Most consumers still do not lock their phones. They don\u2019t use passwords, pass codes, unlock patterns, etc\u2026 What does that mean? If their phones are ever stolen, the thief has instant access to everything on the device. <\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n<figure id=\"attachment_8234\" aria-describedby=\"caption-attachment-8234\" style=\"width: 160px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/08\/small_9814354135.jpg\" alt=\"photo credit: Janitors via photopin cc\" width=\"160\" height=\"240\" class=\"size-full wp-image-8234\" \/><figcaption id=\"caption-attachment-8234\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/janitors\/9814354135\/\">Janitors<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/figcaption><\/figure><span style=\"font-size: 14px; line-height: 1.7em;\">\u201cThe single most important thing you can do to protect your mobile security and privacy is to set a passcode lock to protect your device from unauthorized access,\u201d says Kim. \u201cBut according to our survey, 44% of people still don&#8217;t take this super simple step. Whether snagged by a thief or picked up by a stranger after you&#8217;ve left it behind, your unlocked phone is an open invitation into the intimate details of your life. Every device will have an option in its security settings for some sort of passcode, pattern or even facial recognition to access the device&#8217;s functions. If you don&#8217;t have that option enabled, you&#8217;re inviting a world of problems.\u201d<\/span>\n<\/p><\/blockquote>\n<h3>4. Use Lock\/locate\/wipe software <\/h3>\n<p>The best security advice: Assume your phone will get lost or stolen. How will you get it back? How will you ensure that your (or the company\u2019s) sensitive data isn\u2019t compromised? As explained below, you must be able to remotely locate or wipe your phone if necessary.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cDevices should be configured so that they can be remotely locked, located and wiped in the event of loss or theft,\u201d says Paul Hill, Consultant with <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'SystemExperts']); \" href=\"http:\/\/systemexperts.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">SystemExperts<\/span><\/a>. \u201cAll staff should be taught to promptly report a loss or theft so that the device can be remotely locked, wiped, or located, in a timely manner.\u201d\n<\/p><\/blockquote>\n<h3>5. Don\u2019t store sensitive corporate data on the device<\/h3>\n<p>Even if you take the above precautions, a determined thief could still access data on a phone with the right tools. The best defense: Don\u2019t store sensitive corporate data on your device in the first place. <\/p>\n<p>What does this mean for the business? How do you give employees access to the data they need while maintaining security? <\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cI recommend that organizations treat employee devices as doorways, not destinations,\u201d says Tyler Wassell, Software Development Manager at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'mrc']); \" href=\"https:\/\/www.mrc-productivity.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">mrc<\/span><\/a>. \u201cBy that I mean, employees should be able to access the data they need through their mobile device, without storing it on the device itself. As an example, we provide our employees with secure mobile web apps. They can login and access data through their mobile web browser, without downloading anything to their device. In this way, we keep our data secure while giving them the access they need.\u201d\n<\/p><\/blockquote>\n<h3>6. Be cautious with apps<\/h3>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n<figure id=\"attachment_8236\" aria-describedby=\"caption-attachment-8236\" style=\"width: 175px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/08\/Screenshot_2014-08-07-15-07.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/08\/Screenshot_2014-08-07-15-07.png\" alt=\"Always check the app permissions before installing the app\" width=\"175\" height=\"299\" class=\"size-full wp-image-8236\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/08\/Screenshot_2014-08-07-15-07.png 250w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/08\/Screenshot_2014-08-07-15-07-175x300.png 175w\" sizes=\"auto, (max-width: 175px) 100vw, 175px\" \/><\/a><figcaption id=\"caption-attachment-8236\" class=\"wp-caption-text\">Always check the app permissions before installing the app<\/figcaption><\/figure><span style=\"font-size: 14px; line-height: 1.7em;\">\u201cThe mobile webscape is cluttered with enticing offers of free downloads,\u201d says Robert Siciliano Identity Theft Expert with <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Hotspot Shield']); \" href=\"http:\/\/www.hotspotshield.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Hotspot Shield<\/span><\/a>. \u201cA minority are fraudulent and it\u2019s impossible to tell which are which. Never download from mobile-only sites or those crammed with ads. Download only from app stores you trust.\u201d<\/span>\n<\/p><\/blockquote>\n<p>Going one step further, you should approach every app download with caution&#8211;even those from reputable app stores. Why? Once installed on your phone, apps can access most everything on the device. Carefully inspect how much access an app requires before installing it. The app&#8217;s access requirements might surprise you.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cOne very important security item that is often overlooked involves the apps that you download to your phone,\u201d says Bev Robb, Owner of <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Teksquisite Consulting']); \" href=\"https:\/\/teksquisite.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Teksquisite Consulting<\/span><\/a>. \u201cIt is crucial to carefully review the Terms of Service and privacy policy for each app prior to downloading them.\u201d\n<\/p><\/blockquote>\n<h3>7. Use anti-malware software<\/h3>\n<p>As smartphones become more popular, the amount of smartphone-specific malware grows. We\u2019ve reached a point where our phones need malware protection almost as much as our PCs.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cUse an anti-malware as smartphones are used much like computers today and are subject to the same risks &#8211; much of our data is today submitted through our hand-held devices in form of e-mails, passwords and credit card details,\u201d says Andr\u00e9 Elmoznino Laufer, Security Expert at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'SaferVPN']); \" href=\"http:\/\/www.safervpn.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">SaferVPN<\/span><\/a>. \u201cOf course, have it scan every once in a while and keep it updated. Additionally, make sure to enable a firewall, either the one included in your OS or invest a few bucks and get an anti-malware that includes one.\u201d\n<\/p><\/blockquote>\n<p>So, what do you think? Is there anything you would add to this list? If so, please share your thoughts in the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: As smartphone usage grows in the business, many users still don&#8217;t understand proper security practices. If not addressed, this problem could put their (and your company&#8217;s) sensitive data at risk. Learn how your users can better protect themselves from mobile security threats.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"7 security tips for mobile users (part 1) - mrc&#039;s Cup of Joe Blog","description":"Summary: As smartphone usage grows in the business, many users still don't understand proper security practices. If not addressed, this problem could put their"},"footnotes":""},"categories":[8],"tags":[34],"class_list":["post-8223","post","type-post","status-publish","format-standard","hentry","category-education","tag-mobile"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/8223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=8223"}],"version-history":[{"count":15,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/8223\/revisions"}],"predecessor-version":[{"id":13985,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/8223\/revisions\/13985"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=8223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=8223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=8223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}