Presented by Kevin Lee
   This information is for people that have
    personal smartphones

   For people that have company
    smartphones, contact your companies
    mobile security policy
Why does a person need to secure a
smartphone?
 As cell phones are becoming more like
  pocket-sized computers, they are also
  more vulnerable to different forms of
  cyber attacks
 People want your data! This is a fact of
  life and it applies to either if you have an
  Android, BlackBerry, or iPhone
  smartphone
Password Protection
 By simply enabling a password or PIN
  number on a cell phone, you can save
  yourself a tremendous amount of hassle
  and headache because only you know
  that unique password
 You may be able to set a security on the
  phone so that if someone tries the
  wrong password a certain number of
  times, the phone is automatically wiped
Anti-virus Software
   A person must treat a cell phone like they
    would a PC by installing and keeping an up
    to date anti-virus software
     Lookout Mobile Security (Android)
     SmartGuard Mobile Security (BlackBerry)
     iPhones does not have an anti-virus software
   A security app safeguards your data,
    protect against threats, and an up-to-date
    software protects the device from new
    versions of viruses and new malware
Up-to-date operating
system
 Smartphones need to be patched often
  to eliminate vulnerabilities found since
  the phone was first released
 Updates gets rid of security holes or
  vulnerabilities by maintaining the
  software on both your PC and your
  smartphone
Get apps from a trusted source
   There are plenty of apps out there, stick
    to apps from the phones market
     Android Play Market
     BlackBerry App World
     iPhone App Market
   If you’re downloading an app from a
    third party, do your research to make
    sure the app is reputable and will do
    what you want that app to do
Wi-Fi Network
   Avoid shopping or banking on a public
    network
     Keep in mind that the open Wi-Fi network that
      your phone is connected to might not be secure
     Limit your activity to browsing and avoid
      committing any transaction that involves your
      account information
   Also, be wary about people looking over
    your shoulder and seeing your password,
    e-mails, texts, and account information
Bluetooth devices
 Although many people think of bluetooth
  as a better alternative to a physical wire,
  in fact it creates a personal area
  network, and like any network, it will
  recognize appropriate devices within its
  range
 A phone's bluetooth setting is on by
  default, so it needs to be turned off, or
  configured for a specific device or
  headset
Backup your data
 If your phone gets taken or the data gets
  deleted, it’s a lot easier to get your
  information back when it’s backup
  regularly
 It can mean the difference between a
  slight phone setback or living through
  your own phone nightmare
Conclusion
   Doing these simple tips with help keep
    your phone protected from
    vulnerabilities that might happen to you
       Password Protection
       Anti-virus Software
       Up-to-date operating system
       Get apps from a trusted source
       Wi-Fi Network
       Bluetooth devices
       Backup your data

Mobile Security

  • 1.
  • 2.
    This information is for people that have personal smartphones  For people that have company smartphones, contact your companies mobile security policy
  • 3.
    Why does aperson need to secure a smartphone?  As cell phones are becoming more like pocket-sized computers, they are also more vulnerable to different forms of cyber attacks  People want your data! This is a fact of life and it applies to either if you have an Android, BlackBerry, or iPhone smartphone
  • 4.
    Password Protection  Bysimply enabling a password or PIN number on a cell phone, you can save yourself a tremendous amount of hassle and headache because only you know that unique password  You may be able to set a security on the phone so that if someone tries the wrong password a certain number of times, the phone is automatically wiped
  • 5.
    Anti-virus Software  A person must treat a cell phone like they would a PC by installing and keeping an up to date anti-virus software  Lookout Mobile Security (Android)  SmartGuard Mobile Security (BlackBerry)  iPhones does not have an anti-virus software  A security app safeguards your data, protect against threats, and an up-to-date software protects the device from new versions of viruses and new malware
  • 6.
    Up-to-date operating system  Smartphonesneed to be patched often to eliminate vulnerabilities found since the phone was first released  Updates gets rid of security holes or vulnerabilities by maintaining the software on both your PC and your smartphone
  • 7.
    Get apps froma trusted source  There are plenty of apps out there, stick to apps from the phones market  Android Play Market  BlackBerry App World  iPhone App Market  If you’re downloading an app from a third party, do your research to make sure the app is reputable and will do what you want that app to do
  • 8.
    Wi-Fi Network  Avoid shopping or banking on a public network  Keep in mind that the open Wi-Fi network that your phone is connected to might not be secure  Limit your activity to browsing and avoid committing any transaction that involves your account information  Also, be wary about people looking over your shoulder and seeing your password, e-mails, texts, and account information
  • 9.
    Bluetooth devices  Althoughmany people think of bluetooth as a better alternative to a physical wire, in fact it creates a personal area network, and like any network, it will recognize appropriate devices within its range  A phone's bluetooth setting is on by default, so it needs to be turned off, or configured for a specific device or headset
  • 10.
    Backup your data If your phone gets taken or the data gets deleted, it’s a lot easier to get your information back when it’s backup regularly  It can mean the difference between a slight phone setback or living through your own phone nightmare
  • 11.
    Conclusion  Doing these simple tips with help keep your phone protected from vulnerabilities that might happen to you  Password Protection  Anti-virus Software  Up-to-date operating system  Get apps from a trusted source  Wi-Fi Network  Bluetooth devices  Backup your data