Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»How To Secure Your Mobile Devices
    Cyber Security Awareness Month Tip

    How To Secure Your Mobile Devices

    By Sofia CoraOctober 30, 20233 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Mobile devices are our most commonly used technological devices on a day-to-day basis. It is imperative that we secure our devices and not have any sensitive information become available. Today, I am going to be discussing how we can make our mobile devices more secure and help us feel safer.

    Verify your Apps

    • Make sure that you only download apps from your device’s approved app store. This will help prevent unwanted and malicious apps from taking over your device. Official app stores have security specifications developers must adhere to.
    • Do not download third-party applications as they can cause vulnerabilities to your mobile device and might even be malicious apps.
    • Do not allow apps to access data that it does not need access to. An example would be a writing app asking for your location and photo data. The application does not need that information and you need to turn it off.
    • For apps such as traffic and weather, location data is necessary. However, its essential to make sure those apps will only have access to your sensitive info while you’re actively using the application and don’t run in the background.

    Turn Off Unwanted Services

    • Turn off Auto-Join of Wi-Fi and Bluetooth on your devices. You do not want your devices to randomly join other devices without you even noticing or giving permission.
    • Turn off Geo-Location data on the pictures that you take. Malicious users can take pictures that you post publicly on social media and get information on exactly where that picture was taken. The camera settings in your phone should have an option to turn it off.

    Avoid Prying Eyes

    • When possible, avoid joining public Wi-Fi networks. While free Wi-Fi is nice, many of these networks don’t have security controls, leaving your phone unprotected. Don’t make any purchases or use your credit card while on public Wi-Fi either, as many cybercriminals can now spy on network traffic using Wi-Fi Pineapples.
    • Always log out of financial or shopping sites after you view sensitive data or make a payment. Make sure to use a password manager to store your credentials or other sensitive information.
    • Setting your device screen to automatically lock after a period of inactivity can protect it from unwelcome access. Using auto-lock and a strong password on your phone ensures others cannot access your device, even when left unattended.

    In addition, remember to always install OS updates, many of these updates patch over vulnerabilities and refresh your device’s security. If you follow these tips, you will be much more secure on your mobile device and have an easier time on the web as well.

    Sources

    https://www.cisa.gov/uscert/ncas/tips/st19-003

    https://www.verizon.com/support/securing-your-mobile-device/

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Cybersecurity Awareness Month Tip Cybersecurity Month Mobile Security Awareness
    Previous ArticleIs Tiktok Cybersafe?
    Next Article Why You Should Work in Cybersecurity 

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d