Time
1 hour 1 minute
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:02
so welcome back to mobile device Security Course. In previous video, you have been able to see who are is responsible for mobility, where, security and what are the responsibilities off different people. If you're using the company phone or mobile device
00:20
in this video, I'm going to talk about how to secure mobile devices. And particularly, I'm going to talk about the ways to secure mobile devices in general. And then I'm going to talk about some specifics and securing phones and tablets,
00:36
and I'm going to talk about some things regarding specifics and securing notebooks. But I'm going to talk about these also in the next video in detail.
00:47
So, uh, when you talk about loss or theft,
00:51
uh, you need to find a way
00:54
to secure your device when
00:57
from being stolen. Now, if you're, for example, taking having with yourself mobile phone and if you're dealing with very, very skilled pickpocket, there is not much you can do about preventing them from actually taking it away from you unless you're holding it in your hand. But
01:15
even then, somebody can just push you
01:19
and your device. Can you conduct your device like mobile phone and then somebody can grab you, grab it and ran away with it or something like that. But the most important thing we're talking about is your mobile phone being taken away from you without your knowledge
01:37
and to prevent yourself from being exposed to this kind off technique. Off committing cyber crime
01:47
You should have a simple Bluetooth tracker pair video, mobile phone or tablet, or even your PC. Now there are a couple off types of mobile trackers, or blow to trekkers.
02:00
One is being attached to the device,
02:02
but it absolutely makes no sense when using mobile phone. Because if somebody just steals your mobile phone, they can detach tracker
02:14
forcefully or with simple just removal and believe it next to you. So there is no way that you know
02:23
that you're more well. The rest is being stolen or temporarily stolen. So there are
02:29
devices that can be paired with your mobile phone, and you can keep them somewhere on your person, where
02:35
they don't
02:38
can be easily accessed
02:39
something inside some zipped pocket or somewhere.
02:46
And then if somebody takes your mobile phone and gets out of the Bluetooth range, your device will be
02:53
give up some kind of alarm signal.
02:55
Also, there are some of these devices that have buttons on them, and if they're stealing range and you press ah, this button for a longer period of time or a couple of times like a double click,
03:09
the software on your device will also give a sound that you have defined or some kind of alarm,
03:17
which is also good for finding a phone that you have misplaced.
03:23
But of course, if you're for example, having your notebook with you, you can put it Ah, this device in the in the same bag or backpack where, you know, book is. So if somebody steals your entire bag, um,
03:39
your device will beep when it's away from you. So,
03:45
for example, you have a software on your mobile phone and you're no book is in your bag, and there is a tracker in your bag, and when they steal it and they get away from you for a couple of meters or something like that,
03:58
it will be so. It's good when you're traveling on the airports, on bus stations of railway stations. This is a very good solution.
04:08
The next thing you can have is some kind of tracking software for PC or tablet.
04:13
Now the problem with tracking software is that if somebody steals your device
04:19
and if they're smart enough, they're not going to turn it on when it's connected to a network
04:27
and you're tracking software can work on Lee if your device
04:31
eyes connected to a network so you can find it through
04:36
some code, or because these after is usually offer some kind of cloud base.
04:43
Uh, finder, where you can look from any other PC or some mobile device
04:48
and defined where your devices.
04:51
So the next thing is and this is available. Most liminal books and maybe some tablets
04:59
is that you can have hardware tracking like until be pro,
05:03
which is essentially embedded in the process area of device. So wherever your device, if you're be pro tracking, is is on and
05:14
somebody who stole your PC locks on network logs connected to Internet anywhere in the world,
05:20
even if they wipe the entire disc off your PC,
05:26
uh, you'll still be able to find it because this software it works on process of level is coming, and it's completely independent off
05:36
operating system you're using. It's actually activating before the operating system is starting.
05:44
So when we talk about fake and militias WiFi spots,
05:48
the first thing is, don't connect to WiFi you don't trust.
05:53
So when in public Place always asked for a name of the network and passport, somebody who you know works that publicly is, for example, a restaurant.
06:01
So if you see that there are two similar networks available, check the one that you're 100% sure it is of the place. But even then, you have seen it's not safe, because what they can do is they can switch off the network of the restaurant and put in place their own by five connection,
06:20
which is of course, being wiretapped.
06:24
And he has the same name, so
06:27
it really is not helping.
06:30
Uh, but the other thing is that if you're logged in a public network, always use VPN if it's available on your mobile device. So if you're using the company should know book, for example, and you're logging on the public network
06:44
Immediately after logging, you establish a VPN connection between your PC and your company's server, and then you are safe, regardless off. If somebody's wiretapping, your
06:57
de y your network traffic or not?
07:00
Um
07:01
so if no safe WiFi is available,
07:06
then rather use mobile data, even if it costs more. So,
07:12
yes, it costs more. But what is the most expensive thing is if they get your data, our, for example, your banking application password or something like that, that can cost you much more.
07:24
So just for phones hacking through mobile network, if they are wiretapping through s a seven,
07:30
there is no defense against it. But what you can do is to avoid encrypted, uncredited communication. So, for example, text messages so SMS
07:42
they can see But you for using some
07:46
of encrypted communication tool like bots, half or whatever.
07:51
Uh, so so some software. These messages go from your phone to the server in the crypt in form and the fact that they're trapped tracking the traffic doesn't help them a lot.
08:03
Pretty much the same goals. If we're being eavesdropped, why I am aside, catcher. So
08:09
these are the same things. So just
08:13
just try not to use any unencrypted information. If you can call through services like fiber, so make calls through it.
08:22
Ah, then, um,
08:26
it's much more difficult as, or even impossible for the other people who are is it is working to listen to your conversation.
08:37
So also for phones and tablets talking about Melber backdoors in spyware.
08:45
Never leave your phone or tablet and intendant when in public spaces because they said if it's an android device, it can be just a couple of minutes before they can install malware on your device.
08:56
Uh, never connect your phone or tablet to any USB cable or outlet that is not 100% trusted Now. Today we have notebooks as well, which are can be charged through USB port.
09:09
But you know as well that you cannot use form charger to charge a PC because the voltages different forms, they're usually and five worlds and PC's air usually on 15 or 19 or 20 worlds.
09:24
So you wouldn't do that anyway. But when it comes to phone or tablet, just don't do that, Or if you have to do it,
09:33
uh, you charge only cable. So when you look at the U. S. B cable and this is the old USB type A connector, the inside the two pins are
09:45
used for data and the outside ones are used for power.
09:50
So if you can just
09:52
scraped these two inside beans and remove them, then you turn any regular USB cable into charge. Only cable. There are also whale below the the adapters on online that you can buy for reasonably small amount of money that can. They have, ah, one male and one female connector,
10:13
and you just plug it into charging port. And what comes out on the other side of this power? Only no data. So
10:20
you're safe regarding that thing.
10:24
So these air advice is, uh, in this video and
10:28
a T end. I'm just going to mention that in this video you have been able to learn how to protect your mobile devices and some specific actions for protection off phones and tablets. And the next video. I'm going to talk about some specifics regarding protection off notebooks

Up Next

End User Mobile Security

This course should give you basic ideas on importance of mobile device security, what needs to be protected on mobile device, who should be responsible for mobile device security and what are basic thing you need to do in order to reach that goal.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor