Mobile Device Security

Mobile Device Security

More people than ever before use mobile devices1 and tablets to stay connected and to conduct business online. This is a great convenience, but if your device isn’t secure, then the data on your device could be used by cyber criminals to access your accounts and steal your money or your identity. Follow these steps to help secure your device:

Always Lock Your Phone/Tablet When Not In Use

Set your device to lock automatically after a few minutes of it not being in use. One of the easiest ways to secure a device is to set up a security passcode or lock pattern; set a passcode that only you know. When available, set up Touch ID or facial recognition on your device, and back that up with a unique PIN or lock pattern.

Use Caution with Public Wi-Fi Networks

It’s convenient and tempting to use public Wi-Fi hotspots, but they do not require a password and may not be secure. When your device is connected to public Wi-Fi, avoid visiting websites that contain sensitive or financial information, like your bank or credit card website. Do not share sensitive data (credit card numbers, Social Security numbers, etc.) or conduct online banking from a public hotspot.

Avoid Public Charging Stations Unless There Is An Emergency

Hackers have been known to set up fake charging stations in scams known as “juice jacking.” After you plug in, the hackers can access your phone’s data or install malware on the device.

Download Applications (Apps) Only from Official App Stores

such as Google Play,2 Apple3 App Store, Windows Store and Amazon. Some apps can house malware capable of stealing your data, without your knowledge, as you use your phone or debit money from an app-linked account. Although very uncommon, it is possible for a malicious app to make its way into a legitimate store. Be cautious about what permissions you grant the apps that you download. Before downloading, read the documentation provided by the app developers, understand the level of access to your phone the app requires, and check the number of downloads and reviews

Be Alert to Spam Text Messages

Smartphones are just as susceptible to phishing attacks as computers. These work the same as fraudulent email, directing you to a malicious link to infect your phone or to capture your personal information. Never provide personal information via a text message or a phone call.

Turn On Remote Tracking in Your Mobile Device Settings

Apple users have Find My iPhone, and Android users can enable Find My Device to see the last known location of the device. Both features allow you to remotely wipe your smartphone’s data if it’s stolen or can’t be retrieved.

Back Up Your Data to the Cloud

Keep an ongoing backup of your phone. That way, if it’s ever lost or stolen, you still have all the apps, data and accounts up to date in your backup.

Always Update Your Phone's Operating System (OS) when Prompted

These updates are meant to protect your device and data with the most current protection from viruses, malware and other online threats.

If Your Device Is Lost or Stolen

If Your Device Is Lost

  • Remotely lock your device.
  • Change critical passwords, including the phone and any accounts enabled on the device, especially financial accounts.

If You Believe the Phone Was Stolen or Compromised

  • Remotely wipe your device.
  • Notify your service provider immediately to suspend service.
  • File a police report.