Categories: NewsTips and Tricks

PSA: Secure Your Mobile Devices

Published by
David Z

Think about all the data you have on your phone. These days, that’s more than just a list of phone numbers. We have email accounts, social networking profiles, mobile banking, private notes and documents, and so much more. If our phones were lost and consequently found by someone with less than honest intentions, the list of potentially compromised information would be daunting.

But just how bad could losing your phone be? Symantec recently decided to find out. They intentionally “lost” 50 Android smartphones across various large cities in the US and Canada. Each device was loaded with what appeared to be private data and fitted with special software that allowed Symantec to track what happened. The results? Well, they’re not promising.

Over 95% of the time, those who found the lost device made an attempt to access data such as email or online banking information. 

Let that sink in for a minute. Based on the results of this study, it is safe to assume that if you lose your phone, someone will be poking through all your private and personal data. On a slightly happier note, some sort of attempt was made to return the phone about half the time. But even in those cases most people went snooping around first. Some even directly admitted to doing so, apologizing after the fact. Check out the full report here [PDF].

The moral of the story? Ensure your data is secure! Whether this is through a passcode or gesture based lock, remote wipe capabilities, encrypted data, private records (in the case of DejaOffice), or some combination of these. Your phone simply contains too much personal data to remain unsecured in some way.

PSA: Secure Your Mobile Devices was last updated March 23rd, 2012 by David Z
PSA: Secure Your Mobile Devices was last modified: March 23rd, 2012 by David Z
AddThis Website Tools
David Z

Disqus Comments Loading...

Recent Posts

Awakening into Wholeness: Discovering the Next Stage of Human Development

Like Kegan’s Level 6, this stage points to something ancient and intimate. A way of…

9 hours ago

5 Powerful Actions to Develop MetAware Mind: Adult Development Through Kegan and O’Fallon

Each of these five actions—witnessing the self, studying constructs, holding paradox, expanding perspectives, and engaging…

9 hours ago

Exploring the Benefits of Partnering with Leading CPA Affiliate Network

A premier CPA affiliate network allows affiliates to gain valuable benefits through its sophisticated tracking…

1 day ago

20 Data Analyst Interview Questions to Ace Your Next Interview

n order to prepare for a data analyst interview, it is important to focus on…

2 days ago

The Role Of Scalable Colocation In Modern IT Infrastructure Planning

With the rise of digital transformation, scalable colocation services will expand. The ability of colocation…

2 days ago

Comprehensive Guide to K-1 Visa Processing Times and Steps

The K-1 visa is a powerful option for multinational couples who want to build a…

2 days ago