Today’s mobile phones not only allow us to make calls and send text messages but have evolved into mini computers commonly referred to as smartphones, allowing us to access email, browse the web and perform online transactions. One would feel uncomfortable leaving home without one’s smartphone. Mobile devices have become man’s new best friend, and this connection has been cementing as each year passes. We use our devices to stay in touch, take pictures, shop, bank, listen to music, and socialize. We store personal and professional information on them, and because we use them for almost everything, they have both a high financial and emotional value. Losing your smartphone or tablet, or the information on it, can be a huge pain. If you lose your mobile device, you not only have to replace it, but you could also lose the sensitive information you had stored on it, including account numbers and confidential work or personal information. By now you understand the value of protecting your computer from the myriad of threats faced everyday. But many of us do not realize that we face the same threats, as well as a host of new ones with our mobile devices.
As the dependency on mobile devices increases, cybercriminals and cyber-attacks have also increased towards this new market. We need to understand that mobile devices nowadays are not just mobile phones but are smaller versions of computers and thus the need to protect them almost with the same energy applied to computers.
Mobile Devices Threats

How do you protect your mobile device?
Considering that your mobile device is now an integral component of your day to day life and has literally become part of the human anatomy and how much opportunity cybercriminals have to launch attacks to destroy or corrupt these devices, there is need to protect them. The following are important tips to ensure this:
- Lock your device with a Password
In order to prevent unauthorized access to your device, one needs to put a strong password that conforms to the rules discussed earlier in the Password Chapter. Creating a password on your Android phone for example, is usually performed under Settings -> Personal -> Security -> Screen Lock
- Only install applications (apps) from trusted sources
Before downloading an app, research the app and its publishers. If you are an Android user, avoid installing non-market applications by de-selecting the “unknown sources” option in your device’s Applications Settings menu
- Keep your system updated
Download software updates for your mobile device’s operating system when prompted. This way, you’ll always have the latest security updates and ensure that your device is always performing at an optimal level.
- Don’t hack your device (root or jail break)
Smartphones like computers, run on an operating system (OS). The OS has a security sandbox design, which is meant to limit the data and resources each app is allowed to access. Jailbreaking or rooting the OS would gain complete control over everything on the smartphone, similarly granting the same access to malware.
- Always log out of banking and shopping sites
If your phone or tablet is lost or stolen, a thief can potentially log in to your accounts. Also, never save usernames and passwords in your mobile browser or apps, just in case your device falls into the wrong hands.
- Turn off Wi-Fi, location services, and Bluetooth when they are not in use
Cybercriminals and identity thieves can easily access your information without your knowledge if the connection is not secure. One way to stay safe is to limit your use of hotspots. When you’re away from your home or work network, use a 3G or 4G data connection instead since most mobile phone providers encrypt the traffic between cell towers and your device.
- Avoid texting or emailing personal information
Even if you receive a text that appears to be from your bank or another legitimate business, never respond with personal information. Instead, contact the business directly to confirm their request.
- Don’t click on links or attachments in unsolicited emails or text messages
Remember to use your online best practices, and be wary of links in unsolicited email or text messages (both SMS and MMS). Always delete unsolicited messages as soon as you receive them.
- Backup your device
It is relatively easy to do, and many smartphones and tablets have the capability to backup data wirelessly, so you can quickly restore the information on your phone if the data is lost or accidentally deleted. And, if you lose your device, you will still be able to retrieve your information.
- Install a Security App
Install mobile security app that scans every app you download for malware and spyware. For extra protection, make sure your security app can also protect from unsafe websites.