15) “You likely use your mobile devices to access or store personal and private information—notes, photos, contacts, financial accounts, saved passwords, and more. Accordingly, it is important that you properly secure and manage your mobile devices to protect your personal information.” – University of Michigan Information and Technology Services (Protect Your Mobile Device) Twitter: @its_umich

16) “Don’t share your device with others. Since you can’t set separate passwords on your mobile device, like you can when logging into computers, it’s best not to share your device with anyone.” – Intuit (Protect Your Mobile Device) Twitter: @intuit

17) “This might seem like a ‘duh’ tip, but it surprises me how many people I meet who don’t have a lock screen enabled. Your password is the first line of defense in keeping your data secure, and is the easiest security feature to set up. Of course it’s also worth noting that newer phones on the market like the iPhone 6 and Samsung Galaxy S5 have a fingerprint sensor for locking your phone.” – Brian Burgess, Gizmag (Essential Tips to Keep Your Smartphone Secure) Twitter: @gizmag

18) “SnoopWall, a cybersecurity firm led by a founding member of the U.S. Department of Homeland Security, found that all of the top 10 most popular flashlight apps required user permission to access sensitive data and could actually control and change phone settings. We recently reported that many free flashlight apps that are so popular may be spying on users and stealing their data.” – James Geddes, Tech Times (Free apps like Flashlight can spy and steal personal data: Protect your smartphone with these tips) Twitter: @TechTimes_News

19) “The popularity and adoption of smartphones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, our defense capability is largely constrained by the limited understanding of these emerging mobile malware and the lack of timely access to related samples.” – Yajin Zhou and Xuxian Jiang, Department of Computer Science, North Carolina State University (Android Malware Genome Project) Twitter: @NCState

20) “Attacks that proved successful on PCs are now being tested on unwitting mobile device users to see what works – and with the number of mobile devices with poor protection soaring, there are plenty of easy targets. ‘Attackers are definitely searching after the weakest point in the chain,’ and then honing in on the most successful scams, says Lior Kohavi, CTO at CYREN, a cloud-based security solutions provider in McLean, VA.” – Stacy Collett, CSO Online (Five new threats to your mobile device security) Twitter: @CSOonline

21) “Mobile computing devices can store large amounts of data, are highly portable and are frequently unprotected: They are easy to steal or lose, and unless precautions are taken, an unauthorized person can gain access to the information stored on them or accessed through them. Even if not stolen or lost, intruders can sometimes gain all the access they need if the device is left alone and unprotected, if data is ‘sniffed out of the air’ during wireless communications, or if malware is installed. The results can include crippled devices, personal data loss, disclosure of non-public University data, and disciplinary actions for the device owner.” – Stanford University IT, Secure Computing (Guidelines for Securing Mobile Computing Devices) Twitter: @Stanford

22) “Today’s mobile devices are as powerful and connected as any PC or laptop. Take the same precautions on your mobile device as you do on your computer with regard to messaging and online safety. The first step is STOP. THINK. CONNECT.” – StaySafeOnline.org (Mobile Devices) Twitter: @StaySafeOnline

23) “Whether you’re traveling with a laptop, netbook, smartphone, iPad, or all of the above, the risks and defenses against them are basically the same, according to Joe Nocera, an information security expert and a principal with PricewaterhouseCoopers. ‘Many of the security concerns that people think about when they think about their personal computers are applicable in the mobile world.’ As mobile devices become more sophisticated, they lend themselves to the same types of access to e-mail, passwords, and other secure information that PCs have done in the past.” – Logan Kugler, PCWorld (9 Ways to Keep Your Mobile Devices Secure While Traveling) Twitter: @pcworld

24) “Consider using an image that provides a contact point should someone find your device and wish to return it. For example, the ‘If Found Lock Screen’ for Apple products.” – The University of Chicago IT Services (Mobile Device Security Best Practices) Twitter: @UChicagoITS

25) “Mobile phones, smart phones (phones that support email, documents, and applications) and tablets (such as iPads) are getting fancier and more popular all the time. This makes them a target for theft — hundreds of thousands of mobile devices are reported lost or stolen each year. A thief could use your wireless access, steal your identity and credit card information, or cause you to pay for a new phone and unauthorized charges on your bill.” – MIT Information Systems and Technology (Risks of Mobile Phones and Tablets) Twitter: @mit_istnews

Source: 101 Data Security Tips: Quote from Experts on Breaches, Policy, Mews and More

Leave a Reply