Defend Yourself When You Are Using Mobile Connections

Defend Yourself When You Are Using Mobile Connections
Defend Yourself When You are Using Mobile Connections
October 14, 2014
Basic habits can protect you and your data when you are a mobile user.
o Never leave your laptop or mobile device unattended in a public place!
o Lock your laptop and user accounts with strong passwords and your mobile phone and
e-tablet with a passcode. Set your phone or e-tablet to automatically activate the
passcode when not in use. Use at least an 8 character passcode with mixed upper and
lower case, numbers and symbols, if allowed on your mobile device. Keep your
passcodes private. Watch for shoulder surfers in public locations as you enter your
passcode, password, or user name. Avoid using the same passcode on multiple devices.
o Know the security status of any Wi-Fi networks that you use. It is best to use only
password protected networks, and to know if they are encrypted. Consider not using a
public Wi-Fi if you cannot determine its encryption status. Bad actors can monitor your
activity on an un-encrypted network, and even password protected networks may have
bad actors on them. Know your risk status with public Wi-Fi and be cautious.
o Erase your tracks on a public access computer by turning on anonymous browsing.
o Save financial activity for a secure network you control or manage. Do not pay bills,
shop, bank, or do other sensitive transactions on any public computer or over public WiFi. Your security may be compromised. Your encrypted cellular connection is much
safer. Use your smartphone cellular connection for mobile transactions.
o Turn off Wi-Fi when you are not using the Internet. This prevents your mobile device
from inadvertently connecting to an open and potentially compromised network. You
should deliberately choose to connect to Wi-Fi only when you need it.
Keep a clean machine with all software up to date and current. Protect all of your devices that
connect to the internet including game consoles, tablets, phones, and other web enabled
devices against virus and malware attack with protective software.
Think before you App. Review the privacy policy and understand what data the app needs to
work before you download it. Learn how to disable the GPS Geo Tagging on your phone. You
have no control of how the data may be used by someone else. Your location is personal
Be discriminating about who you share your mobile number with. Only give it out to people
who you trust, or entities that really need to communicate with you on the go. Never give out
someone else’s mobile number without their permission.
If you have doubts about an e-mail, text, or IM, don’t respond. Requests for personal
information or immediate action to prevent damage to an account, etc. are almost always a
scam. Think before you click that unknown link!
Take steps to protect data on your mobile device. Consider a service to locate your phone or etablet and remote erase it if it is lost or stolen.
Use USB storage devices cautiously. Make sure to use encrypted drives to protect your
information. Don’t download from someone else’s flash drive. You don’t know where it has
been, and it may have malware that can infect your device.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF