Smartphones are our future, eventually replacing credit cards with a simple swipe of the device. We text, browse the net, find our way if we’re lost, download data and documents, make appointments, give them voice instructions, and last – make phone calls from our little mini-computers.
They are amazing devices that some of us wonder what we did before them. They are literally full-fledged computers doing tasks that only our laptops and desktops were capable of not that long ago. But with all of their positive attributes, they do have their faults. Because they are mobile devices some of us fail to realize there are security risks as much if not more than our home computers.
This is and has been a major problem with computers, and now we must be on the lookout on our mobile devices as well.
Phishing is simply an email representing a well-known institution such as your bank, asking for personal information to perform a security check, or verification. Sometimes they even direct you to a website that looks exactly like the one you generally use. And as soon as you click on that link, and give your info, the scammer has your information.
Mobile phones are now being targeted as a 2010 Wall Street Journal article stated. It seems that with all of the mobile banking going on with cellular phones, it is becoming easier for phishers than ever. Even mobile banking apps are being put all over the web to fraudulent bank sites.
There are now mobile worms that have the capability to wipe out your entire system, as they have done to laptops and desktops in the past. They create havoc on banking and financial records, and usually will destroy all of your data on your mobile phone as well.
There are now mobile worms that are tailored just for cell phones, as many have discovered.
Since most of us have GPS built right into our smartphones, and as ScienceDaily.com reported, “run the same class of operating systems as desktop and laptop computers” allowing thieves the ability to track you and your device.
When you search out a mobile app that keeps track of someone you want to you don’t trust, so can criminals use these same tools.
Settings for privacy
When you sign into Facebook or Twitter, do you know whether your location is broadcast to everyone looking at your posts? What about your personal data that you keep on your phone?
Some settings on Facebook broadcast your cell phone number when you post from it, making it easy to intercept your information and who knows what else they might be able to intercept.
Privacy settings are essential to keeping your location, and mobile phone private.
This is the scariest of all, losing that treasured device that holds your world in its little computer. Depending on your settings, a thief could gain access to your banking, emails and investment information.
Inc.com can help the uncertain user how to set an access code on your phone that can erase all of your pertinent data should it be lost or stolen.
Some tips that can help you keep your important information safe
- Never leave phone unattended
- Turn on security features
- Set a password to enter your phone
- Report it stolen immediately
- Turn off Bluetooth and GPS when not in use
- Don’t open multimedia email messages
- Keep software updated for security updates
- Scrutinize Wi-Fi networks
- Keep passwords separate from phone
- Delete all information when replacing it.
Keep security and safety in mind each time you use your phone and never trust your privacy to anyone.
Image Courtesy: Microsoft