Mobile Device Security


Mobile Security Tips

More people than ever before use mobile devices1 and tablets to stay connected and to conduct business online. This is a great convenience, but if your device isn’t secure, then the data on your device could be used by cyber criminals to access your accounts and steal your money or your identity. Follow these steps to help secure your device:

Always Lock Your Phone/Tablet When Not In Use
Set your device to lock automatically after a few minutes of it not being in use. One of the easiest ways to secure a device is to set up a security passcode or lock pattern; set a passcode that only you know. When available, set up Touch ID or facial recognition on your device, and back that up with a unique PIN or lock pattern.


Use Caution with Public Wi-Fi Networks

It’s convenient and tempting to use public Wi-Fi hotspots, but they do not require a password and may not be secure. When your device is connected to public Wi-Fi, avoid visiting websites that contain sensitive or financial information, like your bank or credit card website. Do not share sensitive data (credit card numbers, Social Security numbers, etc.) or conduct online banking from a public hotspot.


Avoid Public Charging Stations Unless There Is An Emergency
Hackers have been known to set up fake charging stations in scams known as “juice jacking.” After you plug in, the hackers can access your phone’s data or install malware on the device.


Download Applications (Apps) Only from Official App Stores

such as Google Play,2 Apple3 App Store, Windows Store and Amazon. Some apps can house malware capable of stealing your data, without your knowledge, as you use your phone or debit money from an app-linked account. Although very uncommon, it is possible for a malicious app to make its way into a legitimate store. Be cautious about what permissions you grant the apps that you download. Before downloading, read the documentation provided by the app developers, understand the level of access to your phone the app requires, and check the number of downloads and reviews.


Be Alert to Spam Text Messages

Smartphones are just as susceptible to phishing attacks as computers. These work the same as fraudulent email, directing you to a malicious link to infect your phone or to capture your personal information. Never provide personal information via a text message or a phone call.


Turn On Remote Tracking in Your Mobile Device Settings

Apple users have Find My iPhone, and Android users can enable Find My Device to see the last known location of the device. Both features allow you to remotely wipe your smartphone’s data if it’s stolen or can’t be retrieved.


Back Up Your Data to the Cloud

Keep an ongoing backup of your phone. That way, if it’s ever lost or stolen, you still have all the apps, data and accounts up to date in your backup.


Always Update Your Phone's Operating System (OS) when Prompted

These updates are meant to protect your device and data with the most current protection from viruses, malware and other online threats.

If Your Device Is Lost

  • Remotely lock your device.
  • Change critical passwords, including the phone and any accounts enabled on the device, especially financial accounts.

If You Believe the Phone Was Stolen or Compromised

  • Remotely wipe your device.
  • Notify your service provider immediately to suspend service.
  • File a police report.
  1. A supported mobile device is needed to use Mobile Banking. Standard message and data rates may apply.

  2. Google Pay and Google Play™ and Google Play logo are trademarks of Google LLC.

  3. Apple, and iPod, and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone and Apple Pay are trademarks of Apple Inc. App Store is a servicemark of Apple Inc.

This article is for general information purposes only and is not intended to provide legal, tax, accounting or financial advice. PNC urges its customers to do independent research and to consult with financial and legal professionals before making any financial decisions.

Read a summary of privacy rights for California residents which outlines the types of information we collect, and how and why we use that information.