Mobile Security
MOBILE
SECURITY
An Overview
Contents
Contents
1 What is Mobile Security
2 What are different ways to protect our
mobile devices?
Different Security Software used to ensure
3
security of mobile devices
Conclusion
4
5 Thank You
Introduction
Quick Heal
What is
Mobile
Security
When we say Mobile Security,
we refer to the methods and
Network
Security
software we use to secure the
devices those travel with us
Avast Norton With the internet expanding
more than double every year
we need to secure our devices
to use internet safely
Mobile Devices are obviously
more vulnerable because of
the usage time.
Numbers More Numbers Education
2/3 rd 64% Adults doesn’t have a
screen lock
People use phones for accessibility
and convenience but most of people
don’t know how to keep their mobile
devices secured.
adults 64%
No Regulations
doesn’t have
66% People use Public Wi-Fi
networks
There are very less regulations
mobile 66%
69% People doesn’t backup
made by the government for OEMs
to make the devices they
security their phones
manufacture secure
Applications 69%
Mobile Devices remain weak
Lack of Execution
Those people who know what are
spots
the consequences and knowing how
67% to safeguard their devices don’t care
about it.
Different Steps to protect
Steps
our to secure
mobile devicesour Mobile Devices
Steps:
1. Using strong passwords and using biometrics for authentication
works.
2. Using Mobile Security software.
3. Updating devices immediately when the update is available to
keep the device safe with the latest security patches.
4. Avoiding the use of public Wi-Fi Networks.
5. Taking regular backups of data.
Quick Heal
Avast Norton
Bitdefender Kaspersky
Mobile Security
Software Companies
Meet The
Team
Conclusion
It was amazing experience making this
presentation and we would be glad if
you’ll liked it and with this it is the time to
conclude this presentation with a summary
of what we got to know today:
1. What do we mean by Mobile Security
2. What Numbers say?
3. Different Mobile Security Software
makers and software.
4. Steps to secure our mobile devices.
Radadiya Heet Makwana Atik
Makwana Harsh
Chaturbhai Ikbalbhai
Thank You
Thank You
If you have any question you may ask it we
are eager to answer your questions.