Protecting Your Mobile Device


Smartphones and tablets are essentially mobile computers, they allow you to access the internet, email, download applications, store photos, videos and your personal information on them.  You are responsible for the data stored on your device. So the importance of backing up and protecting the information stored on them cannot be understated.

Here are the top things you can do to secure your mobile and tablet 
In order to protect your phone or tablet and the data stored on it you should have a look at the security features that are available in your phone. All phones should have security settings though the exact options available will differ depending on manufacturer, model and software version.

Set a passcode. This is the easiest way to prevent an unwanted visitor from accessing all of your email, pictures, messages, apps and notes 

Back up your device. It is important to back up your device to prevent any data lost in the event that it is lost or stolen

Keep your system up to date. Check to see that your device is up to date, then set it to update automatically. This is the quickest way for the developer of your phone or tablet to provide you with the most up-to-date protection and can patch security holes that leave you vulnerable
Utilise any remote tracking facility or remote data deletion option on the device if available. This type of service will give you piece of mind in the event that the device is lost/stolen
Report lost or stolen devices immediately. If you lose your device or it is stolen then you can remotely wipe personal data from it
Be wary of connecting to insecure WiFi hotspots. The WiFi you might use to check your email or your bank account balance at your local cafe is likely not protected and is transmitting information to you without encryption
Disable Bluetooth when it is not actively transmitting information and switch Bluetooth devices to hidden mode Bluetooth lets you wirelessly connect to devices and transfer information over short distances. For Bluetooth to work, devices need to see each other and then connect. It is best to leave your phone in undiscoverable mode (hidden) so that it is only visible when you specifically need other people or devices to see it. This means that hackers cannot easily see your phone and attempt to connect to it

Delete all information stored in a device prior to discarding, exchanging or donating it to charity. In particular you should remove any College WiFi or email settings you have stored.


Useful Links