Skip to main content

Mobile Security

When people usually here the words mobile security or computer security, their eyes glaze over and they tune out what is being said. I am going to try to change that. Today we are going to focus on mobile security, if there is any interest after this article I’ll right one about computer security.
Mobile Security - The type of security we are going to talk about will be VERY generalized, and only pertaining to mobile phones and tablets. Let’s start with iOS. I have heard from many people that they don’t want to be bothered to lock their phone/tablet, because it is inconvenient, or “I don’t have anything on it that anyone would want.” If you work in a legal firm or hospital, there is the possibility that you could have client/patient data on your device opening you or your business to a lawsuit or a fine depending on what kid of date was disclosed. The easiest thing you can do is to put a passcode on your device. Most people don’t know that as soon as you apply a password to your device, the device encrypts so that unless you have the passcode, there is no way for a “bad guy” to get in and see your data. While it may be a little inconvenient, it is getting better, with the iPhone 5s you can use your fingerprint to unlock the device. A system I am sure will soon become standard on many devices. Biometrics have been around for some time, and usually didn’t work well, but I must say that the fingerprint reader on my device works really well. I can say that I am very impressed. Some of the other devices that had fingerprint readers never functioned as advertised. After pass codes the most important thing you can do with your iOS device is NOT to jail break it. Jail breaking is the most dangerous thing you can do to your device. In order to jailbreak a device, hackers have to figure out how to exploit a vulnerability. Once a vulnerability is found the hackers create the jailbreak. Now let’s think about this for a second. You are going to give a complete stranger, who is a known hacker, access to your life? If you ever jail broke your phone, you are trusting that person created a virus free replacement for iOS. Think about this, what could possibly be disclosed if a stranger had access to your device? Not only could he read all of your email, but could get a copy of your address book, with all of your friends phone numbers and email addresses. Additionally. there was recently a story in the press about the Google Play store that someone with bad intentions downloaded the top 10 Android apps and injected a virus in them and then uploaded them, There is no telling how many devices were infected before the infection had been discovered. Quick recap - put a passcode on your devices and don’t jailbreak it. These two simple things can make your life much more secure than anything else you could do on your device. If you aren’t using iOS, I have some tips for you also. The passcode suggestion is still in place with any mobile operating system. However the earlier iterations of Android didn’t allow encryption (they do allow whole device encryption now). Encryption must be enabled manually. (Unlike iOS that enables it as soon as a passcode is put on the device.) Another suggestion is to get a good anti virus such as AVG which has been in the Anti-virus game for some time now, and scan regularly, especially if you download a lot of applications.
The bottom line: No matter which device you choose, think about the data that is on your phone, and whether or not you want that information shared with the world. These simple little hints can save you a lot of heartache in the long run.

Comments

Popular posts from this blog

Enterprise OS Thoughts

It has been a while since the WWDC keynote, and I have been mulling over this post. Let’s start with Yosemite. While Yosemite looks amazing, Apple is trying to get into the Enterprise space, and while the new OS is great-looking, enterprises want stability. Wouldn’t it make more sense to go back to the old model of creating a great OS, then when you come up with a new feature, bolt that onto the existing OS, That model worked for some time in both Windows and OS X. Then any new features were added through point upgrades or Service Packs in the Windows world.

In my opinion, enterprises would be well served using this method. It would give larger businesses time to roll out the OS, and would only have to roll out out updates that could be delivered via SUS or Remote Desktop. This is where both camps are ignoring enterprises and just racing to release another OS. in the last 4 years Apple has released Lion, Mountain Lion, Mavericks, and now Yosemite. At the same time Microsoft released V…

From the “You gotta be kidding me” department

Michael Vick's friend, Tony Taylor has cut a deal with prosecutors' to lay out the entire goings on at The 'Bad Newz Kennels'. Apparently everything that was reported, and cited in the indictment was correct. Vick and the rest of his crew were charged with to conspiracy to travel in interstate commerce in aid of unlawful activities, and conspiring to sponsor a dog in an animal fighting venture.
The thing I can't understand is, how a star the magnitude of Vick can stoop to something so vile and repugnant. He is a multi-millionaire, and now it appears he has thrown all of that away. The Atlanta Falcons had forgiven him many things. Giving the finger to the crowd, bad mouthing other players, and so on. It looks like he has finally done something they cannot forgive. (and they shouldn't)
These celebrities need to learn that they are NOT above the law. The time has come to crackdown on all of these prima donnas. Vick's crime is far more heinous, than Paris Hilton…

Alook at the past

At the end of the year, I tend to be more nostalgic. I’m not sure why I got the idea to think about the past, but here we are.My generation is probably the last one to remember life without technology.
When growing up most in my neighborhood had only one television, and the idea of a remote control was the youngest in the room to turn the channel manually. Or how many remember that when the phone rang you never knew who was calling unless you answered it and had to be no further than 3 feet from the base.

Wireless phones were on the horizon, but not anywhere near mainstream. Much less a phone that you would carry with you to be in constant contact with the world, and the only way that someone could find you would be to call around to all the places you normally frequented in hopes of finding you.
I remember a world where if you wanted to play a video game, you had to go to a video arcade. We never thought of having a video game system or a personal computer in your home. A mention of…