SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Presented by Kevin Lee
   This information is for people that have
    personal smartphones

   For people that have company
    smartphones, contact your companies
    mobile security policy
Why does a person need to secure a
smartphone?
 As cell phones are becoming more like
  pocket-sized computers, they are also
  more vulnerable to different forms of
  cyber attacks
 People want your data! This is a fact of
  life and it applies to either if you have an
  Android, BlackBerry, or iPhone
  smartphone
Password Protection
 By simply enabling a password or PIN
  number on a cell phone, you can save
  yourself a tremendous amount of hassle
  and headache because only you know
  that unique password
 You may be able to set a security on the
  phone so that if someone tries the
  wrong password a certain number of
  times, the phone is automatically wiped
Anti-virus Software
   A person must treat a cell phone like they
    would a PC by installing and keeping an up
    to date anti-virus software
     Lookout Mobile Security (Android)
     SmartGuard Mobile Security (BlackBerry)
     iPhones does not have an anti-virus software
   A security app safeguards your data,
    protect against threats, and an up-to-date
    software protects the device from new
    versions of viruses and new malware
Up-to-date operating
system
 Smartphones need to be patched often
  to eliminate vulnerabilities found since
  the phone was first released
 Updates gets rid of security holes or
  vulnerabilities by maintaining the
  software on both your PC and your
  smartphone
Get apps from a trusted source
   There are plenty of apps out there, stick
    to apps from the phones market
     Android Play Market
     BlackBerry App World
     iPhone App Market
   If you’re downloading an app from a
    third party, do your research to make
    sure the app is reputable and will do
    what you want that app to do
Wi-Fi Network
   Avoid shopping or banking on a public
    network
     Keep in mind that the open Wi-Fi network that
      your phone is connected to might not be secure
     Limit your activity to browsing and avoid
      committing any transaction that involves your
      account information
   Also, be wary about people looking over
    your shoulder and seeing your password,
    e-mails, texts, and account information
Bluetooth devices
 Although many people think of bluetooth
  as a better alternative to a physical wire,
  in fact it creates a personal area
  network, and like any network, it will
  recognize appropriate devices within its
  range
 A phone's bluetooth setting is on by
  default, so it needs to be turned off, or
  configured for a specific device or
  headset
Backup your data
 If your phone gets taken or the data gets
  deleted, it’s a lot easier to get your
  information back when it’s backup
  regularly
 It can mean the difference between a
  slight phone setback or living through
  your own phone nightmare
Conclusion
   Doing these simple tips with help keep
    your phone protected from
    vulnerabilities that might happen to you
       Password Protection
       Anti-virus Software
       Up-to-date operating system
       Get apps from a trusted source
       Wi-Fi Network
       Bluetooth devices
       Backup your data

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 

Was ist angesagt? (20)

Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
Mobile security
Mobile securityMobile security
Mobile security
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile security
Mobile securityMobile security
Mobile security
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 

Andere mochten auch

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Mobile communication intro
Mobile communication introMobile communication intro
Mobile communication introTHANDAIAH PRABU
 
Pengantar Mobile Security
Pengantar Mobile Security Pengantar Mobile Security
Pengantar Mobile Security zakiakhmad
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingkalaiselvanresearch
 
blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...dinesh krishna
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And SecurityJames Wernicke
 

Andere mochten auch (17)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Mobile communication intro
Mobile communication introMobile communication intro
Mobile communication intro
 
Pengantar Mobile Security
Pengantar Mobile Security Pengantar Mobile Security
Pengantar Mobile Security
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizing
 
blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Mobile Security Solutions
Mobile Security SolutionsMobile Security Solutions
Mobile Security Solutions
 
Aman PPT
Aman PPTAman PPT
Aman PPT
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 

Ähnlich wie Mobile Security

How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malwareCybermaterial
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 

Ähnlich wie Mobile Security (20)

Mobile security
Mobile security Mobile security
Mobile security
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malware
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 

Mobile Security

  • 2. This information is for people that have personal smartphones  For people that have company smartphones, contact your companies mobile security policy
  • 3. Why does a person need to secure a smartphone?  As cell phones are becoming more like pocket-sized computers, they are also more vulnerable to different forms of cyber attacks  People want your data! This is a fact of life and it applies to either if you have an Android, BlackBerry, or iPhone smartphone
  • 4. Password Protection  By simply enabling a password or PIN number on a cell phone, you can save yourself a tremendous amount of hassle and headache because only you know that unique password  You may be able to set a security on the phone so that if someone tries the wrong password a certain number of times, the phone is automatically wiped
  • 5. Anti-virus Software  A person must treat a cell phone like they would a PC by installing and keeping an up to date anti-virus software  Lookout Mobile Security (Android)  SmartGuard Mobile Security (BlackBerry)  iPhones does not have an anti-virus software  A security app safeguards your data, protect against threats, and an up-to-date software protects the device from new versions of viruses and new malware
  • 6. Up-to-date operating system  Smartphones need to be patched often to eliminate vulnerabilities found since the phone was first released  Updates gets rid of security holes or vulnerabilities by maintaining the software on both your PC and your smartphone
  • 7. Get apps from a trusted source  There are plenty of apps out there, stick to apps from the phones market  Android Play Market  BlackBerry App World  iPhone App Market  If you’re downloading an app from a third party, do your research to make sure the app is reputable and will do what you want that app to do
  • 8. Wi-Fi Network  Avoid shopping or banking on a public network  Keep in mind that the open Wi-Fi network that your phone is connected to might not be secure  Limit your activity to browsing and avoid committing any transaction that involves your account information  Also, be wary about people looking over your shoulder and seeing your password, e-mails, texts, and account information
  • 9. Bluetooth devices  Although many people think of bluetooth as a better alternative to a physical wire, in fact it creates a personal area network, and like any network, it will recognize appropriate devices within its range  A phone's bluetooth setting is on by default, so it needs to be turned off, or configured for a specific device or headset
  • 10. Backup your data  If your phone gets taken or the data gets deleted, it’s a lot easier to get your information back when it’s backup regularly  It can mean the difference between a slight phone setback or living through your own phone nightmare
  • 11. Conclusion  Doing these simple tips with help keep your phone protected from vulnerabilities that might happen to you  Password Protection  Anti-virus Software  Up-to-date operating system  Get apps from a trusted source  Wi-Fi Network  Bluetooth devices  Backup your data