As our whole world become easily accessible on the move, we need to start thinking about the ease of complete access by people other than ourselves. It only takes a second for you to take your eye off your phone and someone could have stolen it. Your phone doesn’t have to be stolen for your information to be accessed though, viruses and malware have been increasingly detected on peoples smartphones.
It Can Happen To Anyone
This thought occurred to me the other day when I came across a news article about Celebrity Big Brother. Not an article likely to be linked to business issues, but it got me thinking. Spencer Pratt, a well-known American reality TV star, entered the Big Brother house in the UK on 3rd January 2013 alongside his beautiful wife Heidi Montag.
Prior to entering the house Heidi tweeted that Spencer had lost the new phone she had got him for Christmas. No big drama was made of this. Upon entering the Big Brother house, Spencer Pratt’s twitter account became very active. After a tweet-blackout from 20th December 2012, on the 1st January 2013 came a tweet “testing testing”. This was immediately picked up by his many followers who didn’t believe it was actually Spencer. To this he began tweeting “personal” images of Heidi that were clearly taken on the phone. The constant tweeting has continued since 1st January despite Spencer being in the Big Brother house.
The ease that someone can access Spencer’s twitter account and publish personal images got me wondering. What are we doing to protect the important information that is accessible through our mobile phones?
Our Mobiles Contain Personal & Business Info
My mobile phone contains apps for personal and business bank accounts, email accounts, social media accounts, blog accounts, photos, contact details and I am sure, other personal applications that I can’t think of.
The mobile cloud allows for files to be accessible on the run which is very convenient but can be extremely detrimental to a business if it falls into the wrong hands. Just imagine if someone got hold of a mobile phone belonging to a highly authoritative CEO. What impact would the release of corporate data have on the company?
What about for people running their own website. You may have login details for your site on your phone, website social media accounts, a contact book full of client details, etc. You may have access via your laptop, but that is not to say someone won’t change or alter your login details to prevent you from getting back in. Most phones are synced with their online accounts automatically.
Is Your Smartphone At Risk?
My phone is password protected but it doesn’t take a genius or an extortionate amount of money to unlock these simple passwords, and with that, the criminal will have access to my whole world. Research conducted recently has found that 70% of mobile phone users do not password protect their phone and only 1% of all stolen mobile phones are recovered.
The way our world is changing means that people expect to have constant contact with clients and customers and a 24/7 means to contact them. Files need to be shared immediately, access to email accounts wherever in the world you are, access to stocks and shares and bank accounts need to be instantaneous. A look back on the browsing history on a person’s mobile phone could provide the perpetrator with some valuable information.
Recently, there has been publicity around the increase in mobile malware. If we thought about this 15 years ago, the idea that someone would be trying to hack our mobile phones was absurd. Why would someone want to access my Nokia Snake top scores? Our lives have changed and therefore the criminal masterminds have changed too. Virus infected Apps are easily downloaded onto mobile phones.
Growing up, we were taught not to open strange emails or download dubious files onto our computer or laptop, but it appears that people are less cautious when it comes to downloading applications onto their mobile phone.
Sophos produced a Security Threat Report where they predict the biggest threat of 2013 will be to the Android operating system. Great, my little Motorola will be under attack. It doesn’t take an army of 10 secret service men to protect a mobile phones data from being stolen, there are some simple and effective measures you can take.
Tips To Protect Your Smartphone
- Secure your mobile phone with a password or pattern lock and change this regularly.
- Log out of applications on your mobile once you are finished using them and do not store your password on the applications.
- Modern smartphones come with a GPS system. Many of the operating systems have applications named such as “find my iPhone”. This will help you track down your mobile phone but the application must be turned on prior to the phone getting stolen!
- If recovering your phone is unlikely, wiping your phone remotely is an excellent way to prevent your information being accessed. This can be done through application such as “find my iPhone”.
- Do your research before downloading applications to your phone. Read the app reviews!
- Run virus software on your phone regularly.
- When out and about, do not walk around with your fancy, brand new smartphone in your hand or sticking out of your pocket for the world to see.
- Take out mobile phone insurance – it won’t protect the data but it will help lessen the blow if your device is stolen.
Have you ever had your phone stolen and if so, what information did they gain access to? What other tips would you give to people wanting to help secure their phone?