Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

How can I protect my smartphones and tablets from cyber-attacks?

published on 2023-08-29 11:00:12 UTC by SECRC
Content:

Over the last couple of weeks we’ve been releasing a weekly blog that breaks down a section of the National Cyber Security Centre’s (NCSC) Small Business Guide. The guide has been split into five key areas and contain easy steps that could save time, money and even your business’ reputation if followed. The guide can’t guarantee protection from all types of cyber-attack, but the steps outlined below can significantly reduce the chances of your business becoming a victim of cybercrime.

So far, we have looked at the importance of backing up your data and how to protect your organisation from malware, next up is keeping your smartphones and tablets safe.

The NCSC’s 5 steps to keeping your smartphones and tablets safe can be found below:

Mobile technology is now an essential part of modern business, with more of our data being stored on tablets and smartphones. What's more, these devices are now as powerful as traditional computers, and because they often leave the safety of the office (and home), they need even more protection than 'desktop' equipment.

With this in mind, here are 5 quick tips that can help keep your mobile devices (and the information stored on them) secure.

1 - Switch on password protection

,A suitably complex PIN or password (opposed to a simple one that can be easily guessed or gleaned from your social media profiles) will prevent the average criminal from accessing your phone. Many devices now include fingerprint recognition to lock your device, without the need for a password. However, these features are not always enabled 'out of the box', so you should always check they have been switched on.

2 - Make sure lost or stolen devices can be tracked, locked or wiped

Staff are more likely to have their tablets or phones stolen (or lose them) when they are away from the office or home. Fortunately, the majority of devices include free web-based tools that are invaluable should you lose your device. You can use them to:

  • track the location of a device
  • remotely lock access to the device (to prevent anyone else using it)
  • remotely erase the data stored on the device
  • retrieve a backup of data stored on the device

Setting up these tools on all your organisation's devices may seem daunting at first, but by using mobile device management software, you can set up your devices to a standard configuration with a single click.

3 – Keep your device up to date

No matter what phones or tablets your organisation is using, it is important that they are kept up to date at all times. All manufacturers (for example Windows, Android, iOS) release regular updates that contain critical security updates to keep the device protected. This process is quick, easy, and free; devices should be set to automatically update, where possible.

Make sure your staff know how important these updates are, and explain how to do it, if necessary. At some point, these updates will no longer be available (as the device reaches the end of its supported life), at which point you should consider replacing it with a modern alternative.

4 - Keep your apps up to date Just like the operating systems on your organisation's devices, all the applications that you have installed should also be updated regularly with patches from the software developers. These updates will not only add new features, but they will also patch any security holes that have been discovered. Make sure staff know when updates are ready, how to install them, and that it's important to do so straight away.

5 – Don't connect to unknown Wi-Fi Hotspots

When you use public Wi-Fi hotspots (for example in hotels or coffee shops), there is no way to easily find out who controls the hotspot, or to prove that it belongs to who you think it does. If you connect to these hotspots, somebody else could access:

  • what you're working on whilst connected
  • your private login details that many apps and web services maintain whilst you're logged on

The simplest precaution is not to connect to the Internet using unknown hotspots, and instead use your mobile 3G or 4G mobile network, which will have built-in security. This means you can also use 'tethering' (where your other devices such as laptops share your 3G/4G connection), or a wireless 'dongle' provided by your mobile network.

You can also use Virtual Private Networks (VPNs), a technique that encrypts your data before it is sent across the Internet. If you're using third party VPNs, you'll need the technical ability to configure it yourself, and should only use VPNs provided by reputable service providers.

How does The South East Cyber Resilience Centre work with SME's to tackle the threat posed by cybercrime?

We provide many free resources designed to improve your #online security, from checklists to Incident Response templates, there's something for everyone. Get yours today and receive our FREE welcome pack here https://www.secrc.police.uk/free-information-pack

We hope this will be useful for you but if you have any further questions or would like to know how we can help your business, please get in touch.

Article: How can I protect my smartphones and tablets from cyber-attacks? - published 10 months ago.

https://www.secrc.police.uk/post/how-can-i-protect-my-smartphones-and-tablets-from-cyber-attacks   
Published: 2023 08 29 11:00:12
Received: 2023 08 29 11:05:45
Feed: Cyber Resilience Centre for the South East
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Views: 1

Custom HTML Block

Click to Open Code Editor