MOBILE SAFEGUARDS AND SOLUTIONS
There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones.
ANDROID
The most important steps you should take to sure your data is secure are:
- Keeping it private: The easiest way to keep prying eyes away from the data stored in your phone is to use its built-in screen lock. Android‘s settings have a category for “Location & Security,” in which you’ll find the “Screen Unlock” settings. You can have the phone ask you to draw a pattern, enter a numeric PIN or enter a password every time you access your phone. The unlock screen is the first line of defense, which will prevent most people from accessing your data should your phone get stolen so don’t disable it.
- Keeping it accessible: Unfortunately, there’s no easy, inexpensive way to back up your entire Android phone, but there are ways to access important data stored on your phone that you don’t want to lose if your phone is stolen. Your contacts, settings and a list of your apps are backed up by default to Google’s servers. If you use other Google services such as Gmail, Calendar and Docs, that data is also automatically synced to the cloud and would not be lost.A free way to create emergency backups of the data from apps that don’t have a cloud syncing option is to periodically connect your phone to your computer via USB to copy files from your SD card to your computer.
- Get your phone back:There are a number of apps that allow you to communicate with your stolen phone, or give you the ability to see where it is on a map, but most cost money or require a subscription. A free one is Prey. Your phone is stolen; go to Prey’s website and flag the device as missing, or SMS a pre-set phrase to the phone. Either will activate the app. (You can also pre-set Prey to activate if the phone’s SIM card is changed.)Prey can then track the phone’s location via GPS or Wi-Fi hotspots, and also send you its network and IP address information. It can also sound an alarm that makes a loud noise for 30 seconds so you can look around for it, or show the thief an alert message to let him know he’s being tracked. Best of all, it can also lock the phone so it can’t be accessed without a special password.
BLACKBERRY
The most important steps you should take to sure your data is secure are:
- Red Alert: If a user encounters a situation in which they feel their safety is about to be compromised, they can raise a Red Alert – either from inside the App or via pressing a dedicated key on the device, even if a keylock is deployed or the Blackberry is holstered. The App will automatically open a voice call to the nominated responder, retrying in the event the call cannot connect. The user’s location will be broadcasted at 60 second intervals, both via SMS and GPRS. Discreet operation is provided via vibration feedbacks to indicate to the user a red alert has been raised and continues to be open. Furthermore, the smartphone can be placed in a ‘lock-out’ mode whereby all other features of the phone are inaccessible whilst a Red Alert is active .
- Amber Alerts: An Amber Alert allows a lone worker to leave a short voice-message outlining any contextual information regarding the situation they are about to enter. This is available through a one button tap in the App. Amber Alerts can be supplemented by an Amber Alert Timer which will count down from a user-defined timer; the timer will vibrate the phone and alert the user it is about to expire. If the timer is not cancelled, the App will automatically raise a red alert .
- BS8484: Safeguard for Blackberry is fully compliant with BS8484; it was the first Smartphone App in the UK to pass audit. The App is able to perform automatic redials in the event that the Red Alert voice call cannot connect. Discreet Dial-In allows an authorized third party or Alarm Receiving Centre to remotely dial into the phone and listen to the user’s environment, in the event of an emergency. The user receives vibration feedback for the duration of the dial-in; reassuring them that a third party is monitoring their situation .
- Location Monitoring : The App makes full use of the location-based features of the smartphone including the GPS and Cell-Siting technology. The App always reports the user’s location using GPS, GPRS and SMS in the event of a Red Alert. Safeguard for Blackberry can also report the user’s location at a fixed frequency (such as every 5 minutes) with minimal impact to battery life. BES Deployment: Deployment can be over the air via the Lone Worker Mobile Platform or via a corporate BES/MDS Server via App pushing to make deployment and installation easy.
IPHONE
The most important steps you should take to sure your data is secure are:
- Red Alert: If a user encounters a situation in which they feel their safety is about to be compromised, they can raise a Red Alert from inside the App or via the Amber Alert Timer function. The App will automatically open a voice call to the nominated responder. The user’s location will be broadcasted at 60 second intervals via GPRS. Discreet operation is provided via vibration feedbacks to indicate to the user a red alert has been raised and continues to be open.
- Amber Alerts: An Amber Alert allows a lone worker to leave a short voice-message outlining any contextual information regarding the situation they are about to enter. This is available through a one button tap in the App. Amber Alerts can be supplemented by an Amber Alert Timer which will count down from a user-defined timer; the timer will vibrate the phone and alert the user it is about to expire. If the timer is not cancelled, the App will automatically raise a red alert.
- Location Monitoring: The App makes full use of the location-based features of the smartphone including the GPS and Cell-Siting technology. The App always reports the user’s location using GPS and GPRS in the event of a Red Alert. Safeguard for iPhone can also report the user’s location at a fixed frequency (such as every 5 minutes) with minimal impact to battery life.
- App Store: Safeguard for iPhone is available today to download from the App Store.
SYMBAIAN
The most important steps you should take to sure your data is secure are:
- Back up your data: with MacAfee you can backup your data from your symbian device or remotely via the web. Securely store your personal information such as sms, contacts, and call logs on MacAfee mobile security web site. in addition to keeping your data safe, you will be able to access them with a web browser anytime from anywhere. protect your photos and videos. With MacAfee, you can back them up and keep them safe, too. Get 24-7 anti-virus protection with mcafee you can protect against viruses, spyware, worms, trojans, and botnets by scanning installed apps, messages, memory card, and more.
based on mcafee’s award-winning anti-malware and backed by over 400 global threat researchers at mcafee labs, mcafee protects against malware and unwanted applications. - Secure your device: mcafee lets you lock your mobile device in the event of loss or theft, even when another sim card is inserted. This limits unauthorized access and makes the device useless to a thief. You can set a message or trigger an alarm on the device to help you recover it.
- Locate and track your device with mcafee, locate and track your lost mobile device. Track inserted sim cards and phone calls to recover your lost device. Once mcafee detects the insertion of a new sim card, your designated buddy will get a sms alert so you can recover your device. in addition, mcafee mobile security lets you track the current location of your device and even plot it out on a map.
- Wipe your data : if all else fails, you can always wipe your data from your device to protect your privacy. mcafee lets you trigger a remote wipe to delete all private data on your device, including contacts, messages, photos, and videos, including those on your removable media card.
WINDOWS PHONE
The most important steps you should take to sure your data is secure are:
- Red Alert: If a user encounters a situation in which they feel their safety is about to be compromised, they can raise a Red Alert – either from inside the App or via pressing a dedicated key on the device, even if a keylock is deployed. The App will automatically open a voice call to the nominated responder, retrying in the event the call cannot connect. The user’s location will be broadcasted at 60 second intervals, both via SMS and GPRS. Discreet operation is provided via vibration feedbacks to indicate to the user a red alert has been raised and continues to be open. Furthermore, the smartphone can be placed in a ‘lock-out’ mode whereby all other features of the phone are inaccessible whilst a Red Alert is active.
- Amber Alerts: An Amber Alert allows a lone worker to leave a short voice-message outlining any contextual information regarding the situation they are about to enter. This is available through a one button tap in the App. Amber Alerts can be supplemented by an Amber Alert Timer which will count down from a user-defined timer; the timer will vibrate the phone and alert the user it is about to expire. If the timer is not cancelled, the App will automatically raise a red alert.
- BS8484: Safeguard for Windows Mobile is fully compliant with BS8484. The App is able to perform automatic redials in the event that the Red Alert voice call cannot connect. Discreet Dial-In allows an authorised third party or Alarm Receiving Center to remotely dial into the phone and listen to the user’s environment, in the event of an emergency. The user receives vibration feedback for the duration of the dial-in, reassuring them that a third party is monitoring their situation.
- Location Monitoring: The App makes full use of the location-based features of the smartphone including the GPS and Cell-Siting technology. The App always reports the user’s location using GPS, GPRS and SMS in the event of a Red Alert. Safeguard for Windows Mobile can also report the user’s location at a fixed frequency (such as every 5 minutes) with minimal impact to battery life.
- Ruggedised Devices: Safeguard for Windows Mobile is also available for Ruggedised Devices such as the Psion EP10 and Motorola MC55. This makes the app an ideal companion for users working in hazardous and dangerous environments.
SAMSUNG BADA
The most important steps you should take to sure your data is secure are:
- Use a screen lock: Some people don’t use a screen lock as it takes an extra second to input your pin before you can do anything on your phone, but it’s your first line of defence against any unauthorized access and should be implemented straight away.On the Galaxy S3, you can change your screen lock by going to Settings > Security > Screen lock. You have lots of options to choose from here, and if you don’t like the conventional PIN access method then you can choose face unlock, which uses the front facing camera to look at your face and compare it to a stored image that is taken at setup. Bear in mind that this is an experimental feature, so it’s not the most foolproof security method in the world.If you want better security from your lock screen, you can choose to go for the more conventional PIN or password method that can’t be circumvented as easily.
- Encrypt the contents of your phone and SD card: If you’re really serious about security, you can encrypt all of the files stored on your phone and SD card so that they can’t be accessed without a master password that’s entered every time your phone is turned on or your SD card is mounted.The initial encryption process takes over an hour to complete, but be patient — if you interrupt it before it’s finished, you may lose some of the data stored on your phone. You can find the encryption option at Settings > Security > Encrypt device.
- REMOTE CONTROLS: The Galaxy S3 comes with a really useful feature called remote controls, which allows you to locate your phone from Samsung’s website as well as remotely lock and erase it. If your phone is ever lost or stolen, you will be able to see exactly where it is at any time and keep your data safe from thieves.
- To set up remote controls, you need to register for a Samsung account so that you can login to the Samsung website and interact with your phone remotely. It’s a free and simple process which you can do right on the phone itself — it just requires your email address and a password. Once it’s set up, the ‘Find my mobile’ feature works like Apple’s ‘Find My iPhone’, using your phone’s GPS radio to show you its current location.Like the screen lock and encryption options, you can activate remote controls through Settings > Security > Remote controls.
There are some solutions to secure our mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones.
- Keep your device with you at all times. Small and convenient works both ways, for you and for the cyber crook. Store the device in your pocket or purse; chain it to your wrist, just keep it with you at all times.
- Lock down your mobile device. Make sure you have a strong password so if anyone does find your device; they‘ll have to work hard to crack your code.
- Make sure all communication between your mobile device and your carrier or operator is fully encrypted. Most carriers can make sure all email and other information flying through their mobile networks are fully encrypted and safe.
- Find out if your company or carrier has mobile device management capabilities that can remotely computing kill your device if it‘s ever lost or stolen. It‘s a sure way to protect confidential information if the worst ever happens and you lose your device.
- Keep your mobile online habits out of the driver‘s seat in your car. Maybe it won‘t stop a cyber crook, but at least you won‘t get into an accident because you were distracted by your smart phone.
- Monitor what your kids do with their mobile phone. Review their contact lists and make sure they exchange messages and phone numbers with people you trust.
- Use a family-friendly cell phone service with child-safe phones for younger children. These services allow parents to define who can be called, how long the phone can be used and what children are allowed to do, keeping them safe .
Mobile anti-virus software: While mobile viruses and spyware are relatively new, protect yourself. The relatively low cost of protection provides great peace of mind when faced with the chance some cyber criminal will unleash a nasty mobile virus in the near future. Mobile firewall software: Just like your PC, mobile devices can be hacked, so it makes sense to prevent anyone from accessing your personal and business information. Family–friendly mobile services: These services allow parents to define who can be called, how long the phone can be used and what children can do with their mobile phones.