Categories: NewsTips and Tricks

PSA: Secure Your Mobile Devices

Published by
David Z

Think about all the data you have on your phone. These days, that’s more than just a list of phone numbers. We have email accounts, social networking profiles, mobile banking, private notes and documents, and so much more. If our phones were lost and consequently found by someone with less than honest intentions, the list of potentially compromised information would be daunting.

But just how bad could losing your phone be? Symantec recently decided to find out. They intentionally “lost” 50 Android smartphones across various large cities in the US and Canada. Each device was loaded with what appeared to be private data and fitted with special software that allowed Symantec to track what happened. The results? Well, they’re not promising.

Over 95% of the time, those who found the lost device made an attempt to access data such as email or online banking information. 

Let that sink in for a minute. Based on the results of this study, it is safe to assume that if you lose your phone, someone will be poking through all your private and personal data. On a slightly happier note, some sort of attempt was made to return the phone about half the time. But even in those cases most people went snooping around first. Some even directly admitted to doing so, apologizing after the fact. Check out the full report here [PDF].

The moral of the story? Ensure your data is secure! Whether this is through a passcode or gesture based lock, remote wipe capabilities, encrypted data, private records (in the case of DejaOffice), or some combination of these. Your phone simply contains too much personal data to remain unsecured in some way.

PSA: Secure Your Mobile Devices was last updated March 23rd, 2012 by David Z
PSA: Secure Your Mobile Devices was last modified: March 23rd, 2012 by David Z
David Z

Disqus Comments Loading...

Recent Posts

The Digital Checkout Revolution: Why Modern Payment Platforms Are Becoming Essential for Small Business Growth

By enhancing customer experience, streamlining operations, ensuring security, and providing actionable insights, these platforms are…

3 hours ago

How to Create Memorable Tech Company Milestone Celebration

Beyond funding rounds and anniversaries, consider celebrating first paying the customer, product launches, team growth…

3 hours ago

Path of Exile 2 Currency Changes in Patch 0.3.0

Patch 0.3.0 reshapes how Path of Exile 2 players think about currency. Tiered orbs bring…

4 hours ago

Useful Tips for Implementing Top Secure Connection Framework

A top secure connection framework grows from careful mapping, smart platform choice, identity strength, application-focused…

23 hours ago

How to Sign PDF on iPhone and Mac Easily – A Complete Guide

Want to sign PDF on iPhone and Mac without hassle? Follow this step-by-step guide to…

23 hours ago

What to Know About Syncing and Backlink Strategies

Watch your organic traffic and search rankings each month. Google Search Console shows who links…

1 day ago