{"id":11173,"date":"2012-02-16T21:05:00","date_gmt":"2012-02-17T02:05:00","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=11173"},"modified":"2021-08-10T18:36:33","modified_gmt":"2021-08-10T22:36:33","slug":"better-mobile-security","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/better-mobile-security\/","title":{"rendered":"Better Mobile Security"},"content":{"rendered":"<p><a href=\"https:\/\/otod.wordpress.com\/2011\/05\/29\/accidentally-locked-your-cell-phone\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-109696\" title=\"Better Mobile Security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cell_secure.jpg?resize=126%2C60&#038;ssl=1\" alt=\"Better Mobile Security\" width=\"126\" height=\"60\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cell_secure.jpg?resize=150%2C72&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cell_secure.jpg?resize=75%2C36&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cell_secure.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 126px) 100vw, 126px\" \/><\/a>Smartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer\u2019s email or messaging server. IT staff can take steps to protect the data on the mobile. <a title=\"www.linkedin.com\" href=\"https:\/\/www.linkedin.com\/in\/egeier\/\" target=\"_blank\" rel=\"noopener noreferrer\">Eric Geier<\/a>, the founder of <a title=\"www.nowiressecurity.com\" href=\"https:\/\/web.archive.org\/web\/20160311093409\/http:\/\/www.nowiressecurity.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">NoWiresSecurity<\/a> <a title=\"www.cioupdate.com\" href=\"https:\/\/web.archive.org\/web\/20160821201621\/http:\/\/www.cioupdate.com\/technology-trends\/6-tips-for-better-mobile-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">writes<\/a> provided <a title=\"www.cioupdate.com\" href=\"http:\/\/www.cioupdate.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CIO Update<\/em><\/a> with 6 tips for better mobile device security.<\/p>\n<p><strong><a href=\"https:\/\/www.bytefusion.com\/products\/ens\/secexmail\/entropycollection.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109698\" title=\"Choose encryption and use it\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-1.gif?resize=120%2C68&#038;ssl=1\" alt=\"Choose encryption and use it\" width=\"120\" height=\"68\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-1.gif?resize=150%2C85&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-1.gif?resize=75%2C43&amp;ssl=1 75w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>Tip No. 1 &#8211; Choose a <a title=\"Mobile operating system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_operating_system\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mobile OS<\/a> that supports encryption and use it<\/strong>: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says <a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple&#8217;s<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"IOS\" href=\"http:\/\/www.apple.com\/ios\" rel=\"homepage\">iOS<\/a> and <a title=\"RIM\" href=\"http:\/\/www.rim.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Research In Motion\u2019s<\/a> (<a title=\"NASDAQ : RIMM\" href=\"https:\/\/crackberry.com\/goodbye-rimm-hello-bbry-research-motion-ticker-change-happens-monday-february-4th\" target=\"_blank\" rel=\"noopener noreferrer\">RIMM<\/a>)<a title=\"blackberry.com\" href=\"http:\/\/us.blackberry.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> BlackBerry<\/a> support encryption for both internal and external storage. Without encryption, it\u2019s possible that someone could recover the data on the device even without your lock PIN or password.<\/p>\n<p>Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that <a title=\"Motorola\" href=\"http:\/\/web.archive.org\/web\/20120510025900\/http:\/\/www.motorola.com:80\/Consumers\/US-EN\/Home?WT.mc_id=CLP_Traffic&amp;WT.mc_ev=click\" target=\"_blank\" rel=\"noopener noreferrer\">Motorola<\/a>\u00a0Mobility&#8217;s (<a title=\"NYSE\" href=\"https:\/\/www.tradingview.com\/chart\/?symbol=NYSE%3AMSI\" target=\"_blank\" rel=\"noopener noreferrer\">MSI<\/a>) business-oriented smartphones offer encryption capabilities on <a href=\"http:\/\/code.google.com\/android\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Android 2.3<\/a>. Android 3.x includes an API to help developers offer encryption on tablets. <a title=\"www.crunchbase.com\" href=\"https:\/\/www.crunchbase.com\/company\/android\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.<\/p>\n<p><strong><a href=\"http:\/\/www.icalvyn.com\/how-to-create-strongest-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109701 size-thumbnail\" title=\"Set a lock PIN or password:\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_strong-e1571447741850-75x65.jpg?resize=75%2C65&#038;ssl=1\" alt=\"Set a lock PIN or password:\" width=\"75\" height=\"65\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_strong-e1571447741850.jpg?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_strong-e1571447741850.jpg?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_strong-e1571447741850.jpg?w=311&amp;ssl=1 311w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Tip No. 2 &#8211; Set a lock PIN or password:<\/strong> The article says that enabling a password, whether it\u2019s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It\u2019s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.<\/p>\n<p><strong>Tip No. 3 &#8211; Enable auto-wiping of data:<\/strong> Most mobile OSes support automatic wiping of the device\u2019s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, <a title=\"Windows Phone 7\" href=\"https:\/\/web.archive.org\/web\/20110823124123\/http:\/\/www.windowsphone7.com:80\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Windows Phone<\/a> 7, and <a title=\"www.huffingtonpost.com\" href=\"https:\/\/www.huffingtonpost.com\/news\/blackberry\" target=\"_blank\" rel=\"noopener noreferrer\">BlackBerry<\/a>. <a title=\"android-developers.blogspot.com\" href=\"http:\/\/android-developers.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> requires a third-party app, such as <a title=\"www.appbrain.com\" href=\"http:\/\/www.appbrain.com\/app\/autowipe\/com.vesperaNovus.app.AutowipeFree\" target=\"_blank\" rel=\"noopener noreferrer\">Autowipe<\/a>.<\/p>\n<p>It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.<\/p>\n<p><strong><a href=\"https:\/\/www.gartner.com\/technology\/reprints.do?id=1-16U0UOL&amp;ct=110801&amp;st=sg\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109703 size-full\" title=\"Setup remote tracking\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gps.jpg?resize=75%2C73&#038;ssl=1\" alt=\"Setup remote tracking\" width=\"75\" height=\"73\" \/><\/a>Tip No. 4 &#8211; Setup remote tracking and management:<\/strong> Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device\u2019s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and\/or wipe it before someone else gets their hands on it. According to Mr. Greer:<\/p>\n<ul>\n<li>For <a title=\"IOS (Apple)\" href=\"http:\/\/www.apple.com\/ios\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iOS 4.2<\/a> or later, Apple provides a free service.<\/li>\n<li>For earlier iOS versions there\u2019s the MobileMe service from Apple at $99 a year after the 60-day free trial.<\/li>\n<li>For Android, you have to use a third-party app.<\/li>\n<li>For <a title=\"Windows Phone 7\" href=\"https:\/\/web.archive.org\/web\/20110823124123\/http:\/\/www.windowsphone7.com:80\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Windows Phone 7<\/a> Microsoft provides the free Windows Live for Mobile service.<\/li>\n<li>For BlackBerry, RIM provides the free <a title=\"BlackBerry Protect\" href=\"https:\/\/web.archive.org\/web\/20190221041118\/http:\/\/blogs.blackberry.com:80\/2010\/07\/introducing-blackberry-protect\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">BlackBerry Protect<\/a> service.<\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/www.wi-fi.org\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109705 size-thumbnail\" title=\"Limit Wi-Fi hotspot usage\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon-4.jpg?resize=75%2C47&#038;ssl=1\" alt=\"Limit Wi-Fi hotspot usage\" width=\"75\" height=\"47\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon-4.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon-4.jpg?w=124&amp;ssl=1 124w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Tip No. 5 &#8211; Limit <a title=\"Wi-Fi\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Wi-Fi\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi<\/a> hotspot usage:<\/strong> When you use <a title=\"lifehacker.com\" href=\"https:\/\/web.archive.org\/web\/20171216142842\/https:\/\/lifehacker.com\/5660769\/what-free-public-wifi-is-and-why-you-should-avoid-it\" target=\"_blank\" rel=\"noopener noreferrer\">public Wi-Fi hotspots<\/a> that aren\u2019t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS\/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don\u2019t; thus eavesdroppers can likely capture their passwords and traffic.<\/p>\n<p>On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn\u2019t as popular. Therefore, when you\u2019re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.<\/p>\n<p>If you insist on using <a title=\"www.wi-fi.org\" href=\"http:\/\/www.wi-fi.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi<\/a> hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.<\/p>\n<p><strong><a href=\"https:\/\/news.softpedia.com\/news\/Mobile-Malware-Stealing-Credit-102512.shtml\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109707\" title=\"Use an antivirus or security app:\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-3.jpg?resize=110%2C90&#038;ssl=1\" alt=\"Use an antivirus or security app:\" width=\"110\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-3.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-3.jpg?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-3.jpg?w=270&amp;ssl=1 270w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Tip No. 6 &#8211; Use an antivirus or security app:<\/strong> Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.<\/p>\n<ul>\n<li><a title=\"AVG\" href=\"https:\/\/free.avg.com\/us-en\/homepage\" target=\"_blank\" rel=\"noopener noreferrer\">AVG<\/a> and NetQin provide free security apps for Android.<\/li>\n<li><a title=\"LookOut\" href=\"https:\/\/web.archive.org\/web\/20171015121852\/https:\/\/www.mylookout.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LookOut<\/a> offers free apps for Android, BlackBerry, and Windows Mobile.<\/li>\n<li>Some paid options include <a title=\"McAfee WaveSecure\" href=\"https:\/\/web.archive.org\/web\/20160213170102\/https:\/\/wavesecure.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee WaveSecure<\/a>, <a title=\"Kaspersky Mobile Security\" href=\"http:\/\/www.kaspersky.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Kaspersky Mobile Security<\/a>, and <a title=\"Trend Micro Mobile Security\" href=\"http:\/\/www.trendmicro.com\/us\/enterprise\/product-security\/mobile-security\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Mobile Security<\/a>.<\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20161221002601\/http:\/\/epicagear.com\/smartphone-security-5-tricks-that-will-help-keep-your-phone-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Smartphone Security: 5 Tricks that Will Help Keep Your Phone Secure<\/a> (epicagear.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tips for better mobile security Choose a mobile OS that supports encryption Set a password Enable auto-wiping and remote tracking Limit Wi-Fi hotspot use<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[431],"tags":[2197,1754,420,202,101,354,1135,304,82,431,421,883,511,397,4,445],"class_list":["post-11173","post","type-post","status-publish","format-standard","hentry","category-mobile","tag-2197","tag-1754","tag-aapl","tag-android","tag-apple","tag-blackberry","tag-ios","tag-iphone","tag-microsoft","tag-mobile","tag-msft","tag-nexus","tag-research-in-motion","tag-rimm","tag-security","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=11173"}],"version-history":[{"count":23,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11173\/revisions"}],"predecessor-version":[{"id":132859,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11173\/revisions\/132859"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=11173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=11173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=11173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}