{"id":10463,"date":"2011-11-10T21:27:53","date_gmt":"2011-11-11T01:27:53","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=10463"},"modified":"2021-07-29T21:33:47","modified_gmt":"2021-07-30T01:33:47","slug":"tablet-security-tips","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/tablet-security-tips\/","title":{"rendered":"Tablet Security Tips"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20230321070228\/https:\/\/www.old-computers.com\/MUSEUM\/photos.asp?t=1&amp;c=1065&amp;st=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-118816\" title=\"Tablet Security Tips\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_computer_old_school-2.jpg?resize=108%2C110&#038;ssl=1\" alt=\"Tablet Security Tips\" width=\"108\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_computer_old_school-2.jpg?resize=148%2C150&amp;ssl=1 148w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_computer_old_school-2.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_computer_old_school-2.jpg?w=295&amp;ssl=1 295w\" sizes=\"auto, (max-width: 108px) 100vw, 108px\" \/><\/a> ICSA Labs, an independent division of Verizon has provided third-party testing and certification of security products since 1989. They\u00a0suggest a series of security tips for smartphone, tablet, or app user&#8217;s <a title=\"www.net-security.org\/\" href=\"https:\/\/web.archive.org\/web\/20160203224222\/http:\/\/net-security.org:80\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> reports.<\/p>\n<h3>Only buy apps from recognized app stores<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-118818\" title=\"App store\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/general_store-1.jpg?resize=100%2C77&#038;ssl=1\" alt=\"App store\" width=\"100\" height=\"77\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/general_store-1.jpg?w=150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/general_store-1.jpg?resize=75%2C58&amp;ssl=1 75w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>Apps from unofficial third-party stores and applications downloaded from peer-to-peer sites are much more likely to contain malware than apps sanctioned by official vendor stores such as the <a title=\"Android App Market\" href=\"https:\/\/market.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android App Market<\/a> or <a class=\"zem_slink\" title=\"App Store\" href=\"https:\/\/web.archive.org\/web\/20111004063343\/http:\/\/www.apple.com:80\/iphone\/apps-for-iphone\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Apple App Store<\/a>.<\/p>\n<h3>Think twice about accepting permissions<\/h3>\n<p>Most applications, legitimate as well as malicious ones, need users to accept several \u201cpermissions\u201d before the apps are installed. Check carefully to be sure that the app comes from a legitimate source. <em>I wrote about mobile phones leaking data <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1df\" target=\"_blank\" rel=\"noopener\">previously<\/a><\/em>.<\/p>\n<h3>Monitor bills for irregular charges.<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-112560\" title=\"Monitor bills\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legelese-e1580182450872-150x111.jpg?resize=100%2C74&#038;ssl=1\" alt=\"Monitor bills\" width=\"100\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legelese-e1580182450872.jpg?resize=150%2C111&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legelese-e1580182450872.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legelese-e1580182450872.jpg?w=407&amp;ssl=1 407w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>If attackers gain access to personal information stored on the mobile device, they can quickly rack up charges by sending \u201csilent\u201d text messages to high-priced call services. For example, if the <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/www.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> <a title=\"www.cisco.com\" href=\"http:\/\/www.cisco.com\/web\/about\/security\/intelligence\/virus-worm-diffs.html\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a> <a title=\"Android Trojan GGTracker\" href=\"http:\/\/www.physorg.com\/news\/2011-06-android-trojan-ggtracker-subscribes-users.html\" target=\"_blank\" rel=\"noopener noreferrer\">GGTracker<\/a> is inadvertently installed on a device, it can sign up users, without their knowledge, for premium text messaging services.<\/p>\n<h3>Employ security policies to protect employer-issued devices<\/h3>\n<p>Employers should enforce password-based access and require <a class=\"zem_slink\" title=\"Voicemail\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Voicemail\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">voice mail<\/a> codes so that only authorized users can get access to data on employer-issued devices.<\/p>\n<h3>Be mindful of more personal devices at work<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-118819\" title=\"more personal devices at work\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-1.jpg?resize=100%2C79&#038;ssl=1\" alt=\"more personal devices at work\" width=\"100\" height=\"79\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-1.jpg?resize=150%2C118&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-1.jpg?resize=75%2C59&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-1.jpg?w=209&amp;ssl=1 209w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>Companies must have security systems and policies in place to safeguard their business environment and prevent access to company networks from employees\u2019 personal devices. <em>I wrote about <a title=\"www.cio.com\" href=\"https:\/\/web.archive.org\/web\/20120118132507\/http:\/\/www.cio.com\/article\/692826\/Forrester_Survey_Suggests_Execs_Driving_Push_for_BYOT\" target=\"_blank\" rel=\"noopener noreferrer\">BYOT<\/a> <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-2N1\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<h3>Remember that a tablet is a tiny PCs<\/h3>\n<p>Many security threats that apply to traditional computers also apply to mobile devices, such as smartphones and tablets, and consumers should take necessary measures to protect themselves. One way to do this is to install anti-malware software on mobile devices and enable <a title=\"searchenterprisewan.techtarget.com\" href=\"https:\/\/web.archive.org\/web\/20170516051331\/http:\/\/searchenterprisewan.techtarget.com:80\/definition\/virtual-private-network\" target=\"_blank\" rel=\"noopener noreferrer\">VPN<\/a> functionality.<\/p>\n<h3>Protect your tablet, smartphone, and voicemail PIN<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-118820\" title=\"Protect your tablet, smartphone, and voicemail PIN\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?resize=67%2C100&#038;ssl=1\" alt=\"Protect your tablet, smartphone, and voicemail PIN\" width=\"67\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?resize=100%2C150&amp;ssl=1 100w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?resize=682%2C1024&amp;ssl=1 682w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?resize=768%2C1153&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?resize=1023%2C1536&amp;ssl=1 1023w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?w=1066&amp;ssl=1 1066w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_dress.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/>If your mobile phone does not have a password, add one that is at least six digits. Try to choose a unique password that is not already used across other systems and accounts. Do not use repeating digits in passwords or voice mail pins. Remember that your provider will never request your voice mail pin, so do not be tempted to give it to anyone who requests it.<\/p>\n<h6 class=\"zemanta-related-title\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul\">\n<li class=\"zemanta-article-ul-li\"><a href=\"https:\/\/web.archive.org\/web\/20120402082108\/http:\/\/www.informationweek.com\/news\/security\/mobile\/231900088\" target=\"_blank\" rel=\"noopener noreferrer\">One Mobile Device Security Threat You Haven&#8217;t Considered<\/a> (informationweek.com)<\/li>\n<li class=\"zemanta-article-ul-li\"><a href=\"https:\/\/web.archive.org\/web\/20120420185506\/http:\/\/www.informationweek.com\/news\/security\/mobile\/231602222\" target=\"_blank\" rel=\"noopener noreferrer\">5 Mobile Security Issues To Watch<\/a> (informationweek.com)<\/li>\n<\/ul>\n<div class=\"zemanta-pixie\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers, and anything else that catches his attention since 2005. You can follow him on\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/div>\n","protected":false},"excerpt":{"rendered":"<p>ICSA Labs offers security tips for smartphone, and tablet users Only buy apps from recognized app stores Don&#8217;t accept permissions to avoid malware<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[742,736,354,812,860,23,813,566,116,397,4,129,652,686],"class_list":["post-10463","post","type-post","status-publish","format-standard","hentry","category-security","tag-adbe","tag-adobe-systems","tag-blackberry","tag-handhelds","tag-ios-apple","tag-malware","tag-mobile-device","tag-mobile-phone","tag-policy","tag-rimm","tag-security","tag-smartphone","tag-tablet-computer","tag-virtual-private-network"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10463"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10463\/revisions"}],"predecessor-version":[{"id":129982,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10463\/revisions\/129982"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}