How to Protect your Mobile Device
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:03
>> Mobile devices are becoming more and
00:03
more popular in the workforce.
00:03
Their big benefit is their portability,
00:03
but that also is one of
00:03
their main vulnerabilities as well.
00:03
If we're going to use mobile devices in the workplace,
00:03
we need to make sure that we follow
00:03
some good security principles.
00:03
Make sure they're protected with passwords or passcodes
00:03
or some names that would
00:03
require you to have strong authentication.
00:03
Bluetooth, the only way to
00:03
secure Bluetooth is to disable it.
00:03
When it's not in use, turn it off.
00:03
Applications, when you install
00:03
applications on these mobile devices,
00:03
they want to know, can I share this information?
00:03
Can I have access to your camera,
00:03
or to your location,
00:03
or any of those other elements?
00:03
Watch what information you turn over to an app.
00:03
There's no reason a cooking application
00:03
needs to know my location,
00:03
so got to think about that.
00:03
If you're storing sensitive information,
00:03
make sure that you have
00:03
access to the remote wipe feature,
00:03
which means if you lose
00:03
that device from a remote location,
00:03
if you type in a proper code,
00:03
that device can be wiped clean of any information.
00:03
Other good things for mobile devices,
00:03
track your mobile device.
00:03
You have to decide about that because
00:03
that requires the GPS function,
00:03
which of course tracks location information.
00:03
But you got to weigh the pros and cons
00:03
>> of whether or not you want to be able
00:03
>> to locate that device should you lose it.
00:03
>> Jailbreaking, or rooting your device
00:03
will break your device
00:03
free of any manufacturer requirements or limitations.
00:03
However, you do compromise your service contract,
00:03
and you leave it open to some vulnerabilities as well.
00:03
These mobile devices,
00:03
are more and more popular smartphones, tablets,
00:03
of course laptops, make sure
00:03
that we secure these devices.
00:03
Make sure that physical security is never overlooked.
00:03
Lock up your laptops, mobile devices,
00:03
when they're not in use, be very
00:03
careful as you travel with them.
00:03
Sensitive information that's mobile
00:03
really presents a unique threat to us,
00:03
so the following steps I hope, are helpful.
Up Next
Instructed By
Similar Content