Archives - Mobile Security


Lock your mobile device

The United States Computer Emergency Readiness Team (US-CERT) advises locking your device when you are not currently using it. You might only step away for a couple of minutes, but that’s enough time for someone to steal or destroy your information. Use strong PINs, passwords and biometric (fingerprints, facial recognition) to prevent others from opening […]

Delete your old, unused apps on all your devices

Have you ever downloaded an app, used it a few times, but never actually got around to deleting it? Don’t worry, you’re not alone. However, it could be a major security risk. If you don’t keep up with your apps, you may not know which ones aren’t being updated anymore. Those dormant apps lose the […]

Never “jailbreak” or “root” your smartphone

You may have heard of jailbreaking. It’s the practice of removing a device’s restricted mode of operation, thus giving the user access to all of the operating system’s features. While this enables greater third-party access, it also strips away all of the safety and security measures put in place by the manufacturer. Jailbreaking turns your […]

Enable remote device wiping or recovery to protect sensitive data

Let’s say you lose your company-given cellphone somewhere, but on that phone there’s delicate corporate information. Enabling remote wipe on your phone allows the IT department to erase the data. Here’s how to do it on an iPhone: The “Find My iPhone” feature must first be enabled On a separate device, sign into iCloud.com and […]

If you notice these strange symptoms, your phone may have been hacked

Although more malware attacks happen to Android users, both Android and iPhone users can be hacked. Common signs include: A noticeably sluggish performance with frequent freezing Strange pop-up alerts Outgoing calls and texts you haven’t sent Poor battery life Use a product like Total Defense Mobile Security software to increase your protection from mobile malware […]

Avoid third-party mobile app stores

Mobile phone and tablet software should be evaluated by approval teams to ensure their quality and security. These procedures are routine on official app stores but cannot be assured with third-party sources. Consequently, stay clear of unofficial storefronts or sideloaded apps from websites.