IT Security in A Nutshell: 3 Best Practices for Smartphone Cybersecurity

Reading Time: 2 minutesKnow these three best practices for keeping your smartphone safe from cybercriminals: Every Smartphone Has a Lock Screen. Use it. Always. Your smartphone is designed for quick, easy access to all your data. No one wants to constantly log into their Gmail app or WhatsApp on the go. One of the main values of a smartphone is that it can stay logged into these services and notify you as soon as you receive a message or an update. This means that anyone who gets a hold of your phone can probably read through your email, notes, messaging apps, view your gallery, and maybe even scroll through medical history without ever needing to know a single username or password. This is why your smartphone or tablet has a lock screen – the setting that makes you punch in a PIN number, connect a pattern of dots or even scan your fingerprint before you can use your phone. It’s not just there to be annoying; it’s there to keep a pickpocket (or nosy co-worker) from viewing everything important in your life that connects to your phone – all in one fell swoop. If you don’t want to spill all your personal secrets, […]
IT Security in A Nutshell- 3 Best Practices for Smartphone Cybersecurity - iSite Computers
Reading Time: 2 minutes

Know these three best practices for keeping your smartphone safe from cybercriminals:

Every Smartphone Has a Lock Screen. Use it. Always.

Your smartphone is designed for quick, easy access to all your data. No one wants to constantly log into their Gmail app or WhatsApp on the go. One of the main values of a smartphone is that it can stay logged into these services and notify you as soon as you receive a message or an update.

This means that anyone who gets a hold of your phone can probably read through your email, notes, messaging apps, view your gallery, and maybe even scroll through medical history without ever needing to know a single username or password.

This is why your smartphone or tablet has a lock screen – the setting that makes you punch in a PIN number, connect a pattern of dots or even scan your fingerprint before you can use your phone.

It’s not just there to be annoying; it’s there to keep a pickpocket (or nosy co-worker) from viewing everything important in your life that connects to your phone – all in one fell swoop.

If you don’t want to spill all your personal secrets, get robbed, or have your identity stolen, use your phone’s lock screen. Set it to turn on the moment your device is idle. Always.

Strangers Shouldn’t Borrow Your Smartphone

Your smartphone’s lock screen can’t keep you safe if you turn it off whenever someone asks.

This is one of the oldest tricks in the book: Ask to borrow someone’s phone to make a quick call, and then step away for “privacy.” What appears to be a simple act of kindness is the easiest way for someone to read your emails, texts, calendar or any other private list or personal information kept on your device.

IT Security in A Nutshell- 3 Best Practices for Smartphone Cybersecurity - iSite Computers

Text Messages Follow the Same Dos and Don’ts as Email

What’s interesting is that so many of us fail to realize that text messages are just another version of email.

Just as with email, you shouldn’t accept gifts from strangers. Don’t reply to texts from people you don’t know. Don’t follow links in texts from people you don’t know. Don’t download pictures or videos or any files from people you don’t know. That’s a great way to get your phone hacked.

If you don’t recognize the number, block the contact, delete the text, and move on.

***

iSite Computers is a Managed IT Services Provider. We help small to medium-sized businesses in South Africa with comprehensive cybersecurity and IT solutions.

Book a free consultation with our expert team to learn more.

Call Isite Computers

Join Our Newsletter

Related Posts

Best Practices for Data Protection in Law Firms

Best Practices for Data Protection in Law Firms

As a law firm operating in South Africa, you are the custodian of sensitive information. Whether it’s client data, case files, or legal documents, the confidentiality and integrity of this data are paramount.  In an era where cyber threats such as ransomware are...

read more
Ransomware Protection Strategies for Law Firms

Ransomware Protection Strategies for Law Firms

Ransomware poses a growing threat to organisations globally – and the legal sector is far from immune. In fact, the sensitive and valuable nature of the data held by law firms makes them a desirable target. With this rising threat, it's imperative for firms to...

read more

Comments

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *